INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:83236c00 r4:83236c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2178c r4:84b21400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2178c r4:830b8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:830b852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027f5e8 r7:df83de60 r6:830b8600 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ccf1d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:2:44 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df915d84 r8:00000002 r7:60000113 r6:df915d8c r5:833a3000 r4:833a3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df915e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b3c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e878c r4:857e8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e878c r4:83363900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a3000 r8:8336392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83363900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363900 r8:8027f5e8 r7:df841e60 r6:83363a00 r5:833a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83367000 INFO: task kworker/0:2:44 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd0fd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:5:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:84115400 r4:84115400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84115400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84115400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502738c r4:85027000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502738c r4:849e6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84115400 r8:849e6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6f80 r8:8027f5e8 r7:df9d5e60 r6:849d8d00 r5:84115400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9b40 INFO: task kworker/1:5:3117 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd581000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:83238c00 r4:83238c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83238c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1f8c r4:84ab1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1f8c r4:849e6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:849e6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6d80 r8:8027f5e8 r7:df9e5e60 r6:849d8e80 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9ac0 INFO: task kworker/1:6:3118 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd94c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:838d6c00 r4:838d6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838d6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df883000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab2b8c r4:84ab2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab2b8c r4:849e6e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838d6c00 r8:849e6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6e00 r8:8027f5e8 r7:df9e5e60 r6:849d8800 r5:838d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9e80 INFO: task kworker/1:7:3120 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cd94c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:8:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:84533000 r4:84533000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84533000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84533000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e026f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae3b8c r4:84ae3800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae3b8c r4:849e6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84533000 r8:849e6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6d00 r8:8027f5e8 r7:df9e5e60 r6:849e6c80 r5:84533000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb000 INFO: task kworker/1:8:3122 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cdcef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:0:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:84530c00 r4:84530c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84530c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84530c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec383000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e7b8c r4:857e7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e7b8c r4:849d8e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84530c00 r8:849d8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849d8e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849d8e00 r8:8027f5e8 r7:df841e60 r6:849e6c00 r5:84530c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4800 INFO: task kworker/0:0:3123 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce45e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:9:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:84532400 r4:84532400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84532400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84532400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508c78c r4:8508c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508c78c r4:849e6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84532400 r8:849e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6b00 r8:8027f5e8 r7:df9e5e60 r6:849e6b80 r5:84532400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb1c0 INFO: task kworker/1:9:3126 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce45e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/1:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:84164800 r4:84164800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84164800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85129340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84164800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85024f8c r4:85024c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85024f8c r4:849e6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84164800 r8:849e69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6980 r8:8027f5e8 r7:df9e5e60 r6:849e6a00 r5:84164800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb1c0 INFO: task kworker/1:10:3127 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ce80f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:3:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:84162400 r4:84162400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84162400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84162400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e638c r4:857e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e638c r4:849d8700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84162400 r8:849d872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849d8700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849d8700 r8:8027f5e8 r7:df9c9e60 r6:849e6a80 r5:84162400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4b80 INFO: task kworker/0:3:3130 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ced77000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:83244800 r4:83244800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521ab40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517238c r4:85172000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517238c r4:849e6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:849e66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6680 r8:8027f5e8 r7:df9e5e60 r6:849e6900 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb500 INFO: task kworker/1:11:3132 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cf2b0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3133 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83242400 r4:83242400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46bf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85027f8c r4:85027c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85027f8c r4:849e6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:849e68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6880 r8:8027f5e8 r7:dfa21e60 r6:849e6800 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb580 INFO: task kworker/1:12:3133 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cf67e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83a4bc00 r4:83a4bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a4bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fe40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517478c r4:85174400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517478c r4:849e6780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a4bc00 r8:849e67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6780 r8:8027f5e8 r7:dfa3de60 r6:849e6580 r5:83a4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb9c0 INFO: task kworker/1:13:3135 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: cfd29000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83a48000 r4:83a48000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a48000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a48000 r7:00000000 r6:83018200 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a0000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e438c r4:844e4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e438c r4:849e6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a48000 r8:849e662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6600 r8:8027f5e8 r7:dfa3de60 r6:849e6500 r5:83a48000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb900 INFO: task kworker/1:14:3137 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d0343000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83a4a400 r4:83a4a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a4a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fbcc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533a78c r4:8533a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533a78c r4:849e6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a4a400 r8:849e64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6480 r8:8027f5e8 r7:dfa55e60 r6:849e6400 r5:83a4a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb900 INFO: task kworker/1:15:3139 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d08b2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3141 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:83b7e000 r4:83b7e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533bf8c r4:8533bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533bf8c r4:849e6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7e000 r8:849e63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6380 r8:8027f5e8 r7:dfa61e60 r6:849d8c00 r5:83b7e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbdc0 INFO: task kworker/1:16:3141 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d0c4d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83b7bc00 r4:83b7bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b7bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ff2c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e4f8c r4:844e4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e4f8c r4:849e6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b7bc00 r8:849e632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6300 r8:8027f5e8 r7:dfa61e60 r6:849d8f80 r5:83b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbd80 INFO: task kworker/1:17:3143 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d102c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3145 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa99d84 r8:00000002 r7:60000113 r6:dfa99d8c r5:83b79800 r4:83b79800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b79800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b79800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535a38c r4:8535a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535a38c r4:849e6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b79800 r8:849e622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6200 r8:8027f5e8 r7:dfa8de60 r6:83bcde00 r5:83b79800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbe80 INFO: task kworker/1:18:3145 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1220000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83b78c00 r4:83b78c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b78c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ff340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e538c r4:844e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e538c r4:849e6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b78c00 r8:849e62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6280 r8:8027f5e8 r7:dfa99e60 r6:83ad6800 r5:83b78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917080 INFO: task kworker/1:19:3146 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d159b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:84560000 r4:84560000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84560000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854acb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84560000 r7:00000000 r6:83018200 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4f8c r4:854c4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c4f8c r4:849e6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84560000 r8:849e61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6180 r8:8027f5e8 r7:dfa99e60 r6:849e6100 r5:84560000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917200 INFO: task kworker/1:20:3148 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1c65000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:84566000 r4:84566000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84566000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512b440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84566000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e4b8c r4:850e4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e4b8c r4:849e6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84566000 r8:849e60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e6080 r8:8027f5e8 r7:dfa99e60 r6:849e6000 r5:84566000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917340 INFO: task kworker/1:21:3150 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d1f4c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3152 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:84564800 r4:84564800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84564800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85551340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84564800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea999000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ebb8c r4:854eb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ebb8c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84564800 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:dfa79e60 r6:830b8400 r5:84564800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917340 INFO: task kworker/1:22:3152 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d27e1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3154 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:84563c00 r4:84563c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84563c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849175c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84563c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85540f8c r4:85540c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85540f8c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84563c00 r8:830b87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfa79e60 r6:830b8700 r5:84563c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849175c0 INFO: task kworker/1:23:3154 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d29ef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3157 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84560c00 r4:84560c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84560c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84560c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554178c r4:85541400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554178c r4:8427d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84560c00 r8:8427d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8427d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8427d880 r8:8027f5e8 r7:dfa79e60 r6:8427d800 r5:84560c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917240 INFO: task kworker/1:24:3157 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d29ef000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3160 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:84566c00 r4:84566c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84566c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856762c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84566c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85541f8c r4:85541c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85541f8c r4:84076900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84566c00 r8:8407692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84076900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84076900 r8:8027f5e8 r7:dfa79e60 r6:84076b00 r5:84566c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917dc0 INFO: task kworker/1:25:3160 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d304a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84563000 r4:84563000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84563000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e0380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84563000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554278c r4:85542400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554278c r4:832c8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84563000 r8:832c82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832c8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c8280 r8:8027f5e8 r7:dfa79e60 r6:832c8200 r5:84563000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:26:3161 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d33aa000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84562400 r4:84562400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84562400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84562400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e678c r4:844e6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e678c r4:8442e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84562400 r8:8442e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8442e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8442e080 r8:8027f5e8 r7:dfa79e60 r6:8442e000 r5:84562400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917f80 INFO: task kworker/1:27:3163 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d33aa000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:8415d400 r4:8415d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8415d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8415d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e5b8c r4:850e5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e5b8c r4:8441bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8415d400 r8:8441bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8441bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8441bf80 r8:8027f5e8 r7:dfa79e60 r6:8441bf00 r5:8415d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856000 INFO: task kworker/1:28:3165 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:8415e000 r4:8415e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8415e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8415e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4b8c r4:857e4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e4b8c r4:83ad8300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8415e000 r8:83ad832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ad8300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ad8300 r8:8027f5e8 r7:dfae9e60 r6:83ad8a80 r5:8415e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856240 INFO: task kworker/1:29:3167 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3169 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:84158c00 r4:84158c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84158c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584a800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84158c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e578c r4:850e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e578c r4:830cd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84158c00 r8:830cd42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027f5e8 r7:dfae9e60 r6:830cd380 r5:84158c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856240 INFO: task kworker/1:30:3169 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d36b4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84023000 r4:84023000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84023000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84023000 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e638c r4:850e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e638c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84023000 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:dfae9e60 r6:8483d000 r5:84023000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856380 INFO: task kworker/1:31:3171 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:84025400 r4:84025400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84025400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85362040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84025400 r7:00000000 r6:83018200 r5:00001000 r4:7f139000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85808b8c r4:85808800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85808b8c r4:8483d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84025400 r8:8483d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d080 r8:8027f5e8 r7:dfb25e60 r6:8483d100 r5:84025400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848564c0 INFO: task kworker/1:32:3174 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84026c00 r4:84026c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84026c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac9c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e6b8c r4:850e6800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e6b8c r4:8483d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84026c00 r8:8483d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d180 r8:8027f5e8 r7:dfb31e60 r6:8483d200 r5:84026c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848565c0 INFO: task kworker/1:33:3175 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb3dd84 r8:00000002 r7:60000013 r6:dfb3dd8c r5:84026000 r4:84026000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84026000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84026000 r7:00000000 r6:83018200 r5:00001000 r4:7f317000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84886b8c r4:84886800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886b8c r4:8483d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84026000 r8:8483d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d280 r8:8027f5e8 r7:dfb49e60 r6:8483d300 r5:84026000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856740 INFO: task kworker/1:34:3177 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d3d91000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83a62400 r4:83a62400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a62400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3d1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488778c r4:84887400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488778c r4:8483d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a62400 r8:8483d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d380 r8:8027f5e8 r7:dfb3de60 r6:8483d400 r5:83a62400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856b40 INFO: task kworker/1:35:3179 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d40a1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:83a60c00 r4:83a60c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a60c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f315000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec483000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84886f8c r4:84886c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886f8c r4:8483d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a60c00 r8:8483d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d480 r8:8027f5e8 r7:dfb55e60 r6:8483d500 r5:83a60c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856b40 INFO: task kworker/1:36:3180 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d40a1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:838eb000 r4:838eb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838eb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecf8c r4:848ecc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ecf8c r4:8483d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838eb000 r8:8483d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d580 r8:8027f5e8 r7:dfb55e60 r6:8483d600 r5:838eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84856d40 INFO: task kworker/1:37:3184 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d446a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:838ed400 r4:838ed400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838ed400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f311000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec357000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488738c r4:84887000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488738c r4:8483d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838ed400 r8:8483d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d680 r8:8027f5e8 r7:dfb61e60 r6:8483d700 r5:838ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c080 INFO: task kworker/1:38:3185 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d446a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:8448ec00 r4:8448ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f30d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84887f8c r4:84887c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84887f8c r4:8483d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448ec00 r8:8483d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d780 r8:8027f5e8 r7:dfb7de60 r6:8483d800 r5:8448ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c180 INFO: task kworker/1:39:3186 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4b48000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84488c00 r4:84488c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84488c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84488c00 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84887b8c r4:84887800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84887b8c r4:8483d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84488c00 r8:8483d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d880 r8:8027f5e8 r7:dfb71e60 r6:8483d900 r5:84488c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c340 INFO: task kworker/1:40:3188 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4cc2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:8448e000 r4:8448e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84134600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead83000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84885f8c r4:84885c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84885f8c r4:8483d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448e000 r8:8483d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483d980 r8:8027f5e8 r7:dfb71e60 r6:8483da00 r5:8448e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c500 INFO: task kworker/1:41:3191 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4cc2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:8448d400 r4:8448d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448d400 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed38c r4:848ed000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ed38c r4:8483da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448d400 r8:8483daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483da80 r8:8027f5e8 r7:dfbade60 r6:8483db00 r5:8448d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c140 INFO: task kworker/1:42:3193 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d4fc1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:8448c800 r4:8448c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448c800 r7:00000000 r6:83018200 r5:00001000 r4:7f307000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec78c r4:848ec400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ec78c r4:8483db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448c800 r8:8483dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483db80 r8:8027f5e8 r7:dfbb9e60 r6:8483dc00 r5:8448c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417c140 INFO: task kworker/1:43:3194 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3197 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:8448b000 r4:8448b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e70c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448b000 r7:00000000 r6:83018200 r5:00001000 r4:7f309000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ec38c r4:848ec000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ec38c r4:8483dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448b000 r8:8483dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483dc80 r8:8027f5e8 r7:dfbb9e60 r6:8483dd00 r5:8448b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417cb00 INFO: task kworker/1:44:3197 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbd9d84 r8:00000002 r7:60000013 r6:dfbd9d8c r5:84489800 r4:84489800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84489800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84489800 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ed78c r4:848ed400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ed78c r4:8483dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84489800 r8:8483ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483dd80 r8:8027f5e8 r7:dfbb9e60 r6:8483de00 r5:84489800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417ccc0 INFO: task kworker/1:45:3199 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5345000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:8448bc00 r4:8448bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e78c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edb8c r4:848ed800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848edb8c r4:8483de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448bc00 r8:8483deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483de80 r8:8027f5e8 r7:dfbb9e60 r6:8483df00 r5:8448bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417cf00 INFO: task kworker/1:46:3200 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5549000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:84144800 r4:84144800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84144800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85586380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84144800 r7:00000000 r6:83018200 r5:00001000 r4:7f227000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba07000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ceb8c r4:858ce800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ceb8c r4:8483df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84144800 r8:8483dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483df80 r8:8027f5e8 r7:dfbb9e60 r6:84133000 r5:84144800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f100 INFO: task kworker/1:47:3203 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5549000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:84146000 r4:84146000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84146000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8417cd00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84146000 r7:00000000 r6:83018200 r5:00001000 r4:7f25d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e7f8c r4:850e7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e7f8c r4:84133080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84146000 r8:841330ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133080 r8:8027f5e8 r7:dfbf1e60 r6:84133100 r5:84146000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f480 INFO: task kworker/1:48:3206 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5b0c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:4:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbfdd84 r8:00000002 r7:60000013 r6:dfbfdd8c r5:84488000 r4:84488000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84488000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84488000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec343000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e6f8c r4:857e6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e6f8c r4:840aaf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84488000 r8:840aafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840aaf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840aaf80 r8:8027f5e8 r7:df9c9e60 r6:84133180 r5:84488000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848953c0 INFO: task kworker/0:4:3207 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5b0c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84145400 r4:84145400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84145400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84145400 r7:00000000 r6:83018200 r5:00001000 r4:7f281000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee38c r4:848ee000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ee38c r4:84133200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84145400 r8:8413322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133200 r8:8027f5e8 r7:dfc09e60 r6:84133280 r5:84145400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f3c0 INFO: task kworker/1:49:3209 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5c46000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:84968c00 r4:84968c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b945c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f227000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848edf8c r4:848edc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848edf8c r4:84133300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968c00 r8:8413332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133300 r8:8027f5e8 r7:dfc21e60 r6:84133380 r5:84968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f880 INFO: task kworker/1:50:3212 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5edf000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84969800 r4:84969800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84969800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f283000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ecb8c r4:848ec800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ecb8c r4:84133400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84969800 r8:8413342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133400 r8:8027f5e8 r7:dfbe5e60 r6:84133480 r5:84969800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417f980 INFO: task kworker/1:51:3213 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d5edf000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3215 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc39d84 r8:00000002 r7:60000113 r6:dfc39d8c r5:8496b000 r4:8496b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496b000 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e778c r4:850e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e778c r4:84133500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496b000 r8:8413352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133500 r8:8027f5e8 r7:dfbe5e60 r6:84133580 r5:8496b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc39fb0 to 0xdfc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417fc40 INFO: task kworker/1:52:3215 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6150000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3218 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83a48c00 r4:83a48c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a48c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8417f880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e7b8c r4:850e7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e7b8c r4:84133600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a48c00 r8:8413362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133600 r8:8027f5e8 r7:dfc39e60 r6:840aaf00 r5:83a48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134000 INFO: task kworker/1:53:3218 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6150000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3219 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84142400 r4:84142400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84142400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b944c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84142400 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ee78c r4:848ee400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ee78c r4:84133680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84142400 r8:841336ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133680 r8:8027f5e8 r7:dfc4de60 r6:840aae80 r5:84142400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134000 INFO: task kworker/1:54:3219 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6430000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3222 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:84040000 r4:84040000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84040000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84040000 r7:00000000 r6:83018200 r5:00001000 r4:7f2fd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eeb8c r4:848ee800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848eeb8c r4:84133700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84040000 r8:8413372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133700 r8:8027f5e8 r7:dfc51e60 r6:840aa800 r5:84040000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:841344c0 INFO: task kworker/1:55:3222 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6430000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:84040c00 r4:84040c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84040c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84040c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2fb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848eef8c r4:848eec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848eef8c r4:84133780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84040c00 r8:841337ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133780 r8:8027f5e8 r7:dfc75e60 r6:840a9f00 r5:84040c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134380 INFO: task kworker/1:56:3224 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d69af000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3225 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc7dd84 r8:00000002 r7:60000013 r6:dfc7dd8c r5:84041800 r4:84041800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84041800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84041800 r7:00000000 r6:83018200 r5:00001000 r4:7f2f9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848ef38c r4:848ef000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ef38c r4:84133800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84041800 r8:8413382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133800 r8:8027f5e8 r7:dfc79e60 r6:845f5900 r5:84041800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134380 INFO: task kworker/1:57:3225 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d69af000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3227 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc35d84 r8:00000002 r7:60000013 r6:dfc35d8c r5:8496c800 r4:8496c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f3c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece81000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fb38c r4:858fb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fb38c r4:84133880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:841338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133880 r8:8027f5e8 r7:dfc7de60 r6:84133900 r5:8496c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134640 INFO: task kworker/1:58:3227 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3229 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc99d84 r8:00000002 r7:60000013 r6:dfc99d8c r5:84968000 r4:84968000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84968000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece79000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858faf8c r4:858fac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858faf8c r4:84133980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968000 r8:841339ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133980 r8:8027f5e8 r7:dfc35e60 r6:84133a00 r5:84968000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134780 INFO: task kworker/1:59:3229 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3231 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:8496d400 r4:8496d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856723c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece71000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fab8c r4:858fa800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fab8c r4:84133a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496d400 r8:84133aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133a80 r8:8027f5e8 r7:dfc99e60 r6:84133b00 r5:8496d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134540 INFO: task kworker/1:60:3231 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d6e31000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:5:3232 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca9d84 r8:00000002 r7:60000013 r6:dfca9d8c r5:8496ec00 r4:8496ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512bb80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec35f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e738c r4:857e7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e738c r4:845f5f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:845f5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845f5f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845f5f00 r8:8027f5e8 r7:df9c9e60 r6:84133b80 r5:8496ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895b40 INFO: task kworker/0:5:3232 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d73f0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfca5d84 r8:00000002 r7:60000113 r6:dfca5d8c r5:8496a400 r4:8496a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f3c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece69000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fa78c r4:858fa400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa78c r4:84133c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496a400 r8:84133c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133c00 r8:8027f5e8 r7:dfc5de60 r6:84133c80 r5:8496a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134c80 INFO: task kworker/1:61:3235 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d73f0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:8496e000 r4:8496e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f3c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fa38c r4:858fa000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fa38c r4:84133d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496e000 r8:84133d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133d00 r8:8027f5e8 r7:dfca5e60 r6:84133d80 r5:8496e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134d00 INFO: task kworker/1:62:3237 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d7cc3000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcbdd84 r8:00000002 r7:60000013 r6:dfcbdd8c r5:8496bc00 r4:8496bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ca400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece11000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f9f8c r4:858f9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f9f8c r4:84133e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496bc00 r8:84133e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133e00 r8:8027f5e8 r7:dfc69e60 r6:84133e80 r5:8496bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84134e80 INFO: task kworker/1:63:3240 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d7cc3000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:3242 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:84990000 r4:84990000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d240 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84990000 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f8b8c r4:858f8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8b8c r4:84133f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990000 r8:84133f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84133f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84133f00 r8:8027f5e8 r7:dfcbde60 r6:84133f80 r5:84990000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d100 INFO: task kworker/1:64:3242 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3243 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84990c00 r4:84990c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84990c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84134800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdf5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f978c r4:858f9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f978c r4:8413f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990c00 r8:8413f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f000 r8:8027f5e8 r7:dfcc9e60 r6:8413f080 r5:84990c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d2c0 INFO: task kworker/1:65:3243 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3245 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84992400 r4:84992400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84992400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84992400 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f8f8c r4:858f8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f8f8c r4:8413f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84992400 r8:8413f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f100 r8:8027f5e8 r7:dfcc9e60 r6:8413f180 r5:84992400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d200 INFO: task kworker/1:66:3245 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3247 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84991800 r4:84991800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84991800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e45c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84991800 r7:00000000 r6:83018200 r5:00001000 r4:7f44b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85905f8c r4:85905c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85905f8c r4:8413f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84991800 r8:8413f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f200 r8:8027f5e8 r7:dfcc9e60 r6:8413f280 r5:84991800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d700 INFO: task kworker/1:67:3247 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d839e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3249 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84994800 r4:84994800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84994800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bacd40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84994800 r7:00000000 r6:83018200 r5:00001000 r4:7f3b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdeb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f938c r4:858f9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f938c r4:8413f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84994800 r8:8413f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f300 r8:8027f5e8 r7:dfcd5e60 r6:8413f380 r5:84994800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d640 INFO: task kworker/1:68:3249 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d88bd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3251 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:84995400 r4:84995400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84995400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413d1c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84995400 r7:00000000 r6:83018200 r5:00001000 r4:7f3af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593c38c r4:8593c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593c38c r4:8413f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84995400 r8:8413f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f400 r8:8027f5e8 r7:dfcd5e60 r6:8413f480 r5:84995400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413d9c0 INFO: task kworker/1:69:3251 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d88bd000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd01d84 r8:00000002 r7:60000013 r6:dfd01d8c r5:84043c00 r4:84043c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84043c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413de80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84043c00 r7:00000000 r6:83018200 r5:00001000 r4:7f449000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85905b8c r4:85905800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85905b8c r4:8413f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84043c00 r8:8413f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f580 r8:8027f5e8 r7:dfcd5e60 r6:840ab000 r5:84043c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413dbc0 INFO: task kworker/1:70:3254 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3255 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd31d84 r8:00000002 r7:60000113 r6:dfd31d8c r5:84043000 r4:84043000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84043000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84043000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec36d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e778c r4:857e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e778c r4:840ab080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84043000 r8:840ab0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab080 r8:8027f5e8 r7:df9c9e60 r6:840ab100 r5:84043000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895ec0 INFO: task kworker/0:6:3255 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:84044800 r4:84044800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84044800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8413de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84044800 r7:00000000 r6:83018200 r5:00001000 r4:7f447000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590578c r4:85905400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590578c r4:8413f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84044800 r8:8413f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f500 r8:8027f5e8 r7:dfd01e60 r6:840ab180 r5:84044800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413ddc0 INFO: task kworker/1:71:3257 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8b76000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3259 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd1dd84 r8:00000002 r7:60000113 r6:dfd1dd8c r5:84993c00 r4:84993c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84993c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84993c00 r7:00000000 r6:83018200 r5:00001000 r4:7f459000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc4f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85919b8c r4:85919800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85919b8c r4:8413f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993c00 r8:8413f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f600 r8:8027f5e8 r7:dfd3de60 r6:8413f680 r5:84993c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd1dfb0 to 0xdfd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413df00 INFO: task kworker/1:72:3259 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d8ff0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3262 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84045400 r4:84045400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84045400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84045400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec45b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e978c r4:857e9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e978c r4:840ab200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84045400 r8:840ab22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab200 r8:8027f5e8 r7:df9c9e60 r6:840ab280 r5:84045400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413a000 INFO: task kworker/0:7:3262 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d91a6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3263 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:84046000 r4:84046000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84046000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84046000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3bb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e838c r4:857e8000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e838c r4:840ab300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84046000 r8:840ab32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab300 r8:8027f5e8 r7:dfd41e60 r6:840ab380 r5:84046000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413a000 INFO: task kworker/0:8:3263 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d9466000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3265 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd65d84 r8:00000002 r7:60000113 r6:dfd65d8c r5:84046c00 r4:84046c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84046c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8417cc00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84046c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4f7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591a78c r4:8591a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591a78c r4:8413f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84046c00 r8:8413f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f700 r8:8027f5e8 r7:dfd1de60 r6:840ab400 r5:84046c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd65fb0 to 0xdfd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132000 INFO: task kworker/1:73:3265 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d9466000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:74:3267 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:74 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:84042400 r4:84042400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84042400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84042400 r7:00000000 r6:83018200 r5:00001000 r4:7f58f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec721000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591bf8c r4:8591bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591bf8c r4:8413f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84042400 r8:8413f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f780 r8:8027f5e8 r7:dfd65e60 r6:840ab480 r5:84042400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:841320c0 INFO: task kworker/1:74:3267 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d96e6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:848a0c00 r4:848a0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87240 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591b38c r4:8591b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591b38c r4:8413f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0c00 r8:8413f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f800 r8:8027f5e8 r7:dfd71e60 r6:840ab500 r5:848a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132280 INFO: task kworker/1:75:3270 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d96e6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3271 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:848a1800 r4:848a1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568a140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f6e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b8638c r4:85b86000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b8638c r4:8413f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a1800 r8:8413f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f880 r8:8027f5e8 r7:dfd71e60 r6:840ab580 r5:848a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd91fb0 to 0xdfd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132300 INFO: task kworker/1:76:3271 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d9a89000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3273 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfda5d84 r8:00000002 r7:60000113 r6:dfda5d8c r5:848a2400 r4:848a2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98d40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f583000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592478c r4:85924400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592478c r4:8413f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a2400 r8:8413f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f900 r8:8027f5e8 r7:dfd91e60 r6:840ab600 r5:848a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132540 INFO: task kworker/1:77:3273 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: d9b37000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd7dd84 r8:00000002 r7:60000013 r6:dfd7dd8c r5:84996000 r4:84996000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84996000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a85700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84996000 r7:00000000 r6:83018200 r5:00001000 r4:7f60f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a43b8c r4:85a43800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a43b8c r4:8413f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84996000 r8:8413f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413f980 r8:8027f5e8 r7:dfd91e60 r6:8413fa00 r5:84996000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132540 INFO: task kworker/1:78:3275 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: da0e3000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3277 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfdb1d84 r8:00000002 r7:60000113 r6:dfdb1d8c r5:84111800 r4:84111800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84111800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84111800 r7:00000000 r6:83018200 r5:00001000 r4:7f583000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec397000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afb38c r4:85afb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afb38c r4:8413fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84111800 r8:8413faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413fa80 r8:8027f5e8 r7:dfd91e60 r6:8413fb00 r5:84111800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb1fb0 to 0xdfdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:841328c0 INFO: task kworker/1:79:3277 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: da488000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfdc1d84 r8:00000002 r7:60000013 r6:dfdc1d8c r5:84998c00 r4:84998c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84998c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84998c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e8b8c r4:857e8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e8b8c r4:840ab700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84998c00 r8:840ab72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab700 r8:8027f5e8 r7:dfd41e60 r6:8413fb80 r5:84998c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc1fb0 to 0xdfdc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413a780 INFO: task kworker/0:9:3279 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: da488000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3286 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfdbdd84 r8:00000002 r7:60000013 r6:dfdbdd8c r5:84999800 r4:84999800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84999800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84999800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec443000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e938c r4:857e9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e938c r4:840ab680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84999800 r8:840ab6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab680 r8:8027f5e8 r7:dfd41e60 r6:8413fd00 r5:84999800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdbdfb0 to 0xdfdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413a8c0 INFO: task kworker/0:10:3286 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: da567000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe01d84 r8:00000002 r7:60000113 r6:dfe01d8c r5:848a3c00 r4:848a3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab2540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f741000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed683000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b86b8c r4:85b86800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b86b8c r4:8413fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3c00 r8:8413fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413fd80 r8:8027f5e8 r7:dfd91e60 r6:840ab780 r5:848a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe01fb0 to 0xdfe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4ec0 INFO: task kworker/1:81:3289 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: daa3b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3290 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfdf5d84 r8:00000002 r7:60000113 r6:dfdf5d8c r5:848a3000 r4:848a3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c89880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f6e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b86f8c r4:85b86c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b86f8c r4:8413fe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3000 r8:8413fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8413fe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8413fe00 r8:8027f5e8 r7:dfe01e60 r6:840ab800 r5:848a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf5fb0 to 0xdfdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4ec0 INFO: task kworker/1:82:3290 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dae50000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3293 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe0dd84 r8:00000002 r7:60000113 r6:dfe0dd8c r5:848a4800 r4:848a4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ba00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec48d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e9f8c r4:857e9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e9f8c r4:840ab900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a4800 r8:840ab92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840ab900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840ab900 r8:8027f5e8 r7:dfd41e60 r6:840ab980 r5:848a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe0dfb0 to 0xdfe0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8413acc0 INFO: task kworker/0:11:3293 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dae50000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe05d84 r8:00000002 r7:60000113 r6:dfe05d8c r5:83236000 r4:83236000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe05e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581b900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec479000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e9b8c r4:857e9800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e9b8c r4:840aba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:840abaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840aba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840aba80 r8:8027f5e8 r7:dfe0de60 r6:840abb00 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe05fb0 to 0xdfe05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2240 INFO: task kworker/0:12:3295 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: db3bf000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3298 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfd59d84 r8:00000002 r7:60000113 r6:dfd59d8c r5:84998000 r4:84998000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84998000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84998000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ea38c r4:857ea000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ea38c r4:840abb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84998000 r8:840abbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abb80 r8:8027f5e8 r7:dfe0de60 r6:8413ff80 r5:84998000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd59fb0 to 0xdfd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2340 INFO: task kworker/0:13:3298 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: db5e4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3300 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe35d84 r8:00000002 r7:60000013 r6:dfe35d8c r5:8499bc00 r4:8499bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581be40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7bb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eaf8c r4:857eac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eaf8c r4:840abc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499bc00 r8:840abc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abc00 r8:8027f5e8 r7:dfd59e60 r6:84138000 r5:8499bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe35fb0 to 0xdfe35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2480 INFO: task kworker/0:14:3300 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: db8e9000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3301 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe39d84 r8:00000002 r7:60000113 r6:dfe39d8c r5:8499c800 r4:8499c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bd80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eab8c r4:857ea800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eab8c r4:840abc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499c800 r8:840abcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abc80 r8:8027f5e8 r7:dfe35e60 r6:84138080 r5:8499c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe39fb0 to 0xdfe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2480 INFO: task kworker/0:15:3301 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dbc25000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3304 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe4dd84 r8:00000002 r7:60000113 r6:dfe4dd8c r5:8499d400 r4:8499d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bf00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eb38c r4:857eb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eb38c r4:840abd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499d400 r8:840abd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abd00 r8:8027f5e8 r7:dfe35e60 r6:84138100 r5:8499d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe4dfb0 to 0xdfe4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2700 INFO: task kworker/0:16:3304 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dbe45000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3306 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3306 tgid:3306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe59d84 r8:00000002 r7:60000113 r6:dfe59d8c r5:8499e000 r4:8499e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581bf80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ebb8c r4:857eb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ebb8c r4:840abd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499e000 r8:840abdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abd80 r8:8027f5e8 r7:dfe4de60 r6:84138180 r5:8499e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe59fb0 to 0xdfe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d26c0 INFO: task kworker/0:17:3306 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dbe45000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3307 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe61d84 r8:00000002 r7:60000113 r6:dfe61d8c r5:8499ec00 r4:8499ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84856140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857eb78c r4:857eb400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857eb78c r4:840abe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499ec00 r8:840abe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abe00 r8:8027f5e8 r7:dfe59e60 r6:84138200 r5:8499ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe61fb0 to 0xdfe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2980 INFO: task kworker/0:18:3307 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dc10a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3310 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe71d84 r8:00000002 r7:60000113 r6:dfe71d8c r5:8499b000 r4:8499b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8499b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858320c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ec38c r4:857ec000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ec38c r4:840abe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499b000 r8:840abeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840abe80 r8:8027f5e8 r7:dfe59e60 r6:84138280 r5:8499b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe71fb0 to 0xdfe71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2b40 INFO: task kworker/0:19:3310 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dc10a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3311 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe7dd84 r8:00000002 r7:60000113 r6:dfe7dd8c r5:84996c00 r4:84996c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84996c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84996c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ebf8c r4:857ebc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ebf8c r4:840abf00 r4:840abf00 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3314 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfe89d84 r8:00000002 r7:60000113 r6:dfe89d8c r5:84993000 r4:84993000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84993000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84993000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb399000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ec78c r4:857ec400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ec78c r4:840abf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84993000 r8:840abfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:840abf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: dca9f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 r4:82ac11e4 r4:e0551dc0 r4:00000000 r5:00001000 r4:ec8e5000 r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 r4:84b6b680 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:22:3316 blocked for more than 453 seconds. Call trace: r4:849a8000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe95e08 r5:00001000 r4:eb57b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d2e80 INFO: task kworker/0:22:3316 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dca9f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3317 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb51d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849a8c00 r8:841390ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d2f80 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb69b000 r5:857ed38c r4:857ed000 r4:84139100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:e0551dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3322 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfeb9d84 r8:00000002 r7:60000113 r6:dfeb9d8c r5:849aa400 r4:849aa400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849aa400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ee78c r4:857ee400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ee78c r4:84139180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849aa400 r8:841391ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84139180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84139180 r8:8027f5e8 r7:dfeade60 r6:84138580 r5:849aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb9fb0 to 0xdfeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d42c0 INFO: task kworker/0:25:3322 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:82ac11e4 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3324 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3324 tgid:3324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfec5d84 r8:00000002 r7:60000113 r6:dfec5d8c r5:849ab000 r4:849ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfec5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85832780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6eb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edb8c r4:857ed800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857edb8c r4:84139200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ab000 r8:8413922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84139200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84139200 r8:8027f5e8 r7:dfeb9e60 r6:84138600 r5:849ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec5fb0 to 0xdfec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: ddd0e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:849abc00 r4:8291892c [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7b3000 r7:dddced80 r6:83018000 r5:857ee38c r4:84139280 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfedde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858328c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857edf8c r4:857edc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857edf8c r4:84139300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ac800 r8:8413932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84139300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84139300 r8:8027f5e8 r7:dfec5e60 r6:84138700 r5:849ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeddfb0 to 0xdfeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848d4680 INFO: task kworker/0:28:3327 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: de5a4000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 r5:00001000 r4:ec8e5000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeede08 r5:00001000 r4:eb829000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfeedfb0 to 0xdfeedff8) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 800f0013 ffffffff r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6b680 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:8450e000 r4:8450e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8450e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b7dfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8450e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb43000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab278c r4:84ab2400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab278c r4:84138e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450e000 r8:84138e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84138e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84138e00 r8:8027f5e8 r7:dfc59e60 r6:84515b80 r5:8450e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84513140 INFO: task kworker/1:89:3423 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84b66900 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e03a5000 r5:84b16b8c r4:84b16800 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 INFO: task kworker/0:191:3684 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: defa0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3688 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:84bea400 r4:84bea400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bea400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfacf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ab238c r4:84ab2000 r10:61c88647 r9:84bea400 r8:84b6e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84b66900 task:kworker/0:192 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:e03c9000 r5:84b16f8c r4:84b16c00 r10:61c88647 r9:84beb000 r8:84b6b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66c40 INFO: task kworker/0:192:3690 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: df2b5000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3694 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0585d84 r8:00000002 r7:60000013 r6:e0585d8c r5:84bee000 r4:84bee000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bee000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bee000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1738c r4:84b17000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1738c r4:84b6b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bee000 r8:84b6b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:84b66d80 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0551d28 to 0xe0551d70) r4:82ac11e4 r4:e0551dc0 r5:00001000 r4:ec8e5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3696 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0595d84 r8:00000002 r7:60000013 r6:e0595d8c r5:84bebc00 r4:84bebc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bebc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1778c r4:84b17400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1778c r4:84b6b880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bebc00 r8:84b6b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b880 r8:8027f5e8 r7:e0585e60 r6:84b6eb00 r5:84bebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0595fb0 to 0xe0595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849f9d80 INFO: task kworker/0:194:3696 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: df6f6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08 r5:00001000 r4:e0597000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6b900 r8:8027f5e8 r7:e0595e60 r6:84b6eb80 r5:84bf0000 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e0551dc0 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:3698 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e05a5d84 r8:00000002 r7:60000013 r6:e05a5d8c r5:84bf0c00 r4:84bf0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bf0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849f9d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b17b8c r4:84b17800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b17b8c r4:84b6b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf0c00 r8:84b6b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b980 r8:8027f5e8 r7:e05a1e60 r6:84b6ec00 r5:84bf0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6f080 INFO: task kworker/0:196:3698 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: dfc6d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:df97b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84bf3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bf3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6f300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1c38c r4:84b1c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1c38c r4:84b6ba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf3c00 r8:84b6baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6ba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6ba80 r8:8027f5e8 r7:e05b9e60 r6:84b6ed00 r5:84bf3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05bdfb0 to 0xe05bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6f240 INFO: task kworker/0:198:3702 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e0183000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:84bf5400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6f500 r5:00001000 r4:e05bf000 r7:dddced80 r6:83018000 r5:84b1c78c r4:84b6bb00 Exception stack(0xe05d5fb0 to 0xe05d5ff8) task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:e0551dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:84bf2400 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6f600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1cb8c r4:84b1c800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1cb8c r4:84b6bb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf2400 r8:84b6bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6bb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6bb80 r8:8027f5e8 r7:e05b9e60 r6:84b6ee00 r5:84bf2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6f380 INFO: task kworker/0:200:3706 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e065b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:3708 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3708 tgid:3708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0601d84 r8:00000002 r7:60000113 r6:e0601d8c r5:84bf6000 r4:84bf6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bf6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05e7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6bc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: e0761000 ec8a9000 00000001 80239b98 7f1e1000 00000001 r4:e0551dc0 r5:00001000 r4:ec8e5000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84bf1800 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05f3000 r7:dddced80 r6:83018000 r5:84b1d38c r4:84b6bc80 r4:84b6bc80 Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6f7c0 INFO: task kworker/0:202:3709 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e0c0b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:3711 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e04d5d84 r8:00000002 r7:60000113 r6:e04d5d8c r5:84bf4800 r4:84bf4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bf4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:df9a9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: e0e13000 ec8a9000 00000001 80239b98 7f1e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:3713 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:3713 tgid:3713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0535d84 r8:00000002 r7:60000013 r6:e0535d8c r5:84aae000 r4:84aae000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84aae000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6fcc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1df8c r4:84b1dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1df8c r4:84b6bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aae000 r8:84b6bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6bd80 r8:8027f5e8 r7:e04d5e60 r6:84b6be00 r5:84aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6f5c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0551d28 to 0xe0551d70) r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 INFO: task kworker/0:205:3716 blocked for more than 454 seconds. r4:8488b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b1e78c r4:84b1e400 r10:00000000 r9:84b6be80 r8:8027f5e8 r7:e0535e60 r6:84b6bf00 r5:8488b000 Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e1241000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 r4:84bed400 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfa17000 r4:84b6bf80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: e1587000 ec8a9000 00000001 80239b98 7f1e1000 00000001 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6fd40 INFO: task kworker/0:207:3720 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e1726000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:3721 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:3721 tgid:3721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0635d84 r8:00000002 r7:60000113 r6:e0635d8c r5:84bec800 r4:84bec800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bec800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:dfb8f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 1d60: 80230ad4 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:e062dd84 r8:00000002 r7:60000013 r6:e062dd8c r5:84beec00 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfc1d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab2f8c r4:84ab2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab2f8c r4:84b6e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84beec00 r8:84b6e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e180 r8:8027f5e8 r7:dfc71e60 r6:84b6e200 r5:84beec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7df00 INFO: task kworker/1:99:3724 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e1a3e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84bf8000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:00001000 r4:dfc61000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6e280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfc05000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b86080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e1f79000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:3731 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:84bfb000 r4:84bfb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bfb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b882c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1fb8c r4:84b1f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1fb8c r4:84b86100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bfb000 r8:84b8612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86100 r8:8027f5e8 r7:e063de60 r6:84b6e400 r5:84bfb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) r4:84b6dc80 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3732 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84bf8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b88040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1f78c r4:84b1f400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1f78c r4:84b86180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf8c00 r8:84b861ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86180 r8:8027f5e8 r7:e064de60 r6:84b8e000 r5:84bf8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84b6dc80 Call trace: Exception stack(0xe0551d28 to 0xe0551d70) r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0551fb0 to 0xe0551ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r9:83018005 r8:84bfc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b86200 r8:8027f5e8 r7:e064de60 r6:84b8e080 r5:84bfc800 INFO: task kworker/0:212:3734 is blocked on a mutex likely owned by task kworker/0:190:3683. 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 r4:e0551dc0 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84b6b680 Exception stack(0xe0551fb0 to 0xe0551ff8) r4:84b66900 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84bfbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84bfbc00 r8:84b8e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e180 r8:8027f5e8 r7:e0565e60 r6:84b8e200 r5:84bfbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91540 INFO: task kworker/1:101:3738 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e27e2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:3740 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:84bfec00 r4:84bfec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bfec00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84b1ff8c r4:84b1fc00 Exception stack(0xe0505fb0 to 0xe0505ff8) Call trace: Exception stack(0xe0551d28 to 0xe0551d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:3742 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84bfa400 r4:84bfa400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bfa400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b88540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bfa400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2038c r4:84b20000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2038c r4:84b86300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bfa400 r8:84b8632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86300 r8:8027f5e8 r7:e0679e60 r6:84b8e280 r5:84bfa400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3744 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:102 state:D stack:0 pid:3744 tgid:3744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e059dd84 r8:00000002 r7:60000113 r6:e059dd8c r5:84bfd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08 r5:00001000 r4:dfd23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b8e300 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0551d28 to 0xe0551d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfd87000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab3f8c r4:84ab3c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab3f8c r4:84b8e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85000c00 r8:84b8e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e480 r8:8027f5e8 r7:e059de60 r6:84b8e500 r5:85000c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b1fb0 to 0xe05b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91cc0 INFO: task kworker/1:103:3746 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0551d28 to 0xe0551d70) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85001800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91c00 r5:00001000 r4:dfdeb000 r7:ddde2d80 r6:83018200 r5:844e2f8c r4:84b8e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e400 r8:8027f5e8 r7:e05b1e60 r6:84b8e580 r5:85001800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91c00 INFO: task kworker/1:104:3747 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e2f13000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:215 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e029f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b86380 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:105:3752 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:85003c00 r4:85003c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85003c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d0c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85003c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e338c r4:844e3000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e338c r4:84b8e680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85003c00 r8:84b8e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e680 r8:8027f5e8 r7:e05b5e60 r6:84b8e700 r5:85003c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0605fb0 to 0xe0605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91280 INFO: task kworker/1:105:3752 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e352f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:106:3754 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:106 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4685d84 r8:00000002 r7:60000113 r6:e4685d8c r5:85002400 r4:85002400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85002400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4685e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85002400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe47000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e238c r4:844e2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e238c r4:84b8e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85002400 r8:84b8e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e780 r8:8027f5e8 r7:e0605e60 r6:84b8e800 r5:85002400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4685fb0 to 0xe4685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d100 INFO: task kworker/1:106:3754 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e384b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:107:3756 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:107 state:D stack:0 pid:3756 tgid:3756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:843e0000 r4:843e0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e0f8c r4:844e0c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e0f8c r4:84b8e880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e0000 r8:84b8e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e880 r8:8027f5e8 r7:e4685e60 r6:84b86400 r5:843e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d2c0 INFO: task kworker/1:107:3756 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e384b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:108:3757 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:108 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:843e1800 r4:843e1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1b8c r4:844e1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e1b8c r4:84b8e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e1800 r8:84b8e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e900 r8:8027f5e8 r7:e0639e60 r6:84b86480 r5:843e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d3c0 INFO: task kworker/1:108:3757 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e3af0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3760 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3760 tgid:3760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4689d84 r8:00000002 r7:60000113 r6:e4689d8c r5:843e2400 r4:843e2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4689e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1f8c r4:844e1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e1f8c r4:84b8e980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e2400 r8:84b8e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e980 r8:8027f5e8 r7:e0611e60 r6:84b86500 r5:843e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4689fb0 to 0xe4689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d4c0 INFO: task kworker/1:109:3760 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e3af0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3761 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e468dd84 r8:00000002 r7:60000113 r6:e468dd8c r5:843e3000 r4:843e3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e468de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9d8c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae038c r4:84ae0000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae038c r4:84b8ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e3000 r8:84b8ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ea00 r8:8027f5e8 r7:e4689e60 r6:84b86580 r5:843e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe468dfb0 to 0xe468dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d4c0 INFO: task kworker/1:110:3761 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e3ee1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3763 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4695d84 r8:00000002 r7:60000113 r6:e4695d8c r5:843e4800 r4:843e4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4695e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9da00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff35000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae078c r4:84ae0400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae078c r4:84b8ea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e4800 r8:84b8eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ea80 r8:8027f5e8 r7:e468de60 r6:84b86600 r5:843e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4695fb0 to 0xe4695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d780 INFO: task kworker/1:111:3763 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e3ee1000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3765 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46a1d84 r8:00000002 r7:60000013 r6:e46a1d8c r5:843e3c00 r4:843e3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9dd00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e026d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae0f8c r4:84ae0c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae0f8c r4:84b8eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e3c00 r8:84b8eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8eb00 r8:8027f5e8 r7:e4695e60 r6:84b86680 r5:843e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46a1fb0 to 0xe46a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d880 INFO: task kworker/1:112:3765 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e424a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3767 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3767 tgid:3767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e05c5d84 r8:00000002 r7:60000113 r6:e05c5d8c r5:85003000 r4:85003000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85003000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9dbc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85003000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae0b8c r4:84ae0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae0b8c r4:84b8eb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85003000 r8:84b8ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8eb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8eb80 r8:8027f5e8 r7:e46a1e60 r6:84b8ec00 r5:85003000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c5fb0 to 0xe05c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9d880 INFO: task kworker/1:113:3767 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e44a8000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:114:3770 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:114 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e4691d84 r8:00000002 r7:60000013 r6:e4691d8c r5:85006000 r4:85006000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85006000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4691e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85006000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0283000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae138c r4:84ae1000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae138c r4:84b8ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85006000 r8:84b8ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ec80 r8:8027f5e8 r7:e46a1e60 r6:84b8ed00 r5:85006000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4691fb0 to 0xe4691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9dc80 INFO: task kworker/1:114:3770 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e4722000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3772 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85006c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85006c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85006c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0393000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1b8c r4:84ae1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae1b8c r4:84b8ed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85006c00 r8:84b8edac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ed80 r8:8027f5e8 r7:e4691e60 r6:84b8ee00 r5:85006c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46adfb0 to 0xe46adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9dc00 INFO: task kworker/1:115:3772 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e4a9a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3774 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3774 tgid:3774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46b5d84 r8:00000002 r7:60000113 r6:e46b5d8c r5:85005400 r4:85005400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85005400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b88f00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85005400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b20b8c r4:84b20800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b20b8c r4:84b86700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85005400 r8:84b8672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86700 r8:8027f5e8 r7:e0679e60 r6:84b8ee80 r5:85005400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46b5fb0 to 0xe46b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b88e40 INFO: task kworker/0:216:3774 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e4a9a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3775 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46bdd84 r8:00000002 r7:60000113 r6:e46bdd8c r5:85008000 r4:85008000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85008000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c240 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85008000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0367000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae178c r4:84ae1400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae178c r4:84b8ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85008000 r8:84b8ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ef00 r8:8027f5e8 r7:e46ade60 r6:84b8ef80 r5:85008000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91ec0 INFO: task kworker/1:116:3775 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e500c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3778 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46c5d84 r8:00000002 r7:60000013 r6:e46c5d8c r5:85009800 r4:85009800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85009800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85009800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21f8c r4:84b21c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b21f8c r4:84b86780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85009800 r8:84b867ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86780 r8:8027f5e8 r7:e0679e60 r6:84b98000 r5:85009800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46c5fb0 to 0xe46c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b88ec0 INFO: task kworker/0:217:3778 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e500c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3779 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46cdd84 r8:00000002 r7:60000113 r6:e46cdd8c r5:8500b000 r4:8500b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b88840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8500b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e033b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2138c r4:84b21000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2138c r4:84b86800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:84b8682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86800 r8:8027f5e8 r7:e46c5e60 r6:84b98080 r5:8500b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46cdfb0 to 0xe46cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b88ec0 INFO: task kworker/0:218:3779 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e527c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3781 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46c9d84 r8:00000002 r7:60000013 r6:e46c9d8c r5:85008c00 r4:85008c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85008c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85008c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b21b8c r4:84b21800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b21b8c r4:84b86880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85008c00 r8:84b868ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86880 r8:8027f5e8 r7:e46c5e60 r6:84b98100 r5:85008c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46c9fb0 to 0xe46c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b888c0 INFO: task kworker/0:219:3781 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e527c000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:117:3785 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:117 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46a5d84 r8:00000002 r7:60000113 r6:e46a5d8c r5:8500bc00 r4:8500bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c4c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae1f8c r4:84ae1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae1f8c r4:84b98180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500bc00 r8:84b981ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98180 r8:8027f5e8 r7:e46ade60 r6:84b98200 r5:8500bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46a5fb0 to 0xe46a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c200 INFO: task kworker/1:117:3785 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e5545000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3786 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3786 tgid:3786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46b1d84 r8:00000002 r7:60000013 r6:e46b1d8c r5:8500c800 r4:8500c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500c800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae238c r4:84ae2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae238c r4:84b98280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500c800 r8:84b982ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98280 r8:8027f5e8 r7:e46a5e60 r6:84b98300 r5:8500c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46b1fb0 to 0xe46b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c340 INFO: task kworker/1:118:3786 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e57e9000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:3788 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46d9d84 r8:00000002 r7:60000113 r6:e46d9d8c r5:843e5400 r4:843e5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c7c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0409000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae278c r4:84ae2400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae278c r4:84b98380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e5400 r8:84b983ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98380 r8:8027f5e8 r7:e46b1e60 r6:84b86900 r5:843e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46d9fb0 to 0xe46d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c500 INFO: task kworker/1:119:3788 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e57e9000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:120:3790 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46e1d84 r8:00000002 r7:60000013 r6:e46e1d8c r5:843e0c00 r4:843e0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9c900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0421000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2b8c r4:84ae2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae2b8c r4:84b98400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e0c00 r8:84b9842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98400 r8:8027f5e8 r7:e46d9e60 r6:84b86980 r5:843e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46e1fb0 to 0xe46e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c640 INFO: task kworker/1:120:3790 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e5f40000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:121:3792 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:121 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46d1d84 r8:00000002 r7:60000113 r6:e46d1d8c r5:8500d400 r4:8500d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9cc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0463000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae338c r4:84ae3000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae338c r4:84b98480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500d400 r8:84b984ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98480 r8:8027f5e8 r7:e46e1e60 r6:84b98500 r5:8500d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46d1fb0 to 0xe46d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c780 INFO: task kworker/1:121:3792 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e5f40000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:122:3793 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:122 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46d5d84 r8:00000002 r7:60000013 r6:e46d5d8c r5:8500e000 r4:8500e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9ca40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e043b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae2f8c r4:84ae2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae2f8c r4:84b98580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500e000 r8:84b985ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98580 r8:8027f5e8 r7:e46d1e60 r6:84b98600 r5:8500e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46d5fb0 to 0xe46d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9c780 INFO: task kworker/1:122:3793 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e636d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3796 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46e9d84 r8:00000002 r7:60000113 r6:e46e9d8c r5:8500ec00 r4:8500ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8500ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0240 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0413000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85080b8c r4:85080800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85080b8c r4:84b98680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:84b986ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98680 r8:8027f5e8 r7:e46d1e60 r6:84b98700 r5:8500ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46e9fb0 to 0xe46e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9cac0 INFO: task kworker/1:123:3796 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e636d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:e05ddd84 r8:00000002 r7:60000013 r6:e05ddd8c r5:85004800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85004800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa41000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2238c r4:84b22000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2238c r4:84b86a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85004800 r8:84b86a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86a00 r8:8027f5e8 r7:e46c5e60 r6:84b98780 r5:85004800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b89740 INFO: task kworker/0:220:3801 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e636d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3803 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:85010000 r4:85010000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85010000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85010000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2278c r4:84b22400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b2278c r4:84b86a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85010000 r8:84b86aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86a80 r8:8027f5e8 r7:e05dde60 r6:84b98800 r5:85010000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b89980 INFO: task kworker/0:221:3803 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85010c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46f5e08 r5:00001000 r4:dfba9000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe46f5fb0 to 0xe46f5ff8) INFO: task kworker/0:222:3804 is blocked on a mutex likely owned by task kworker/0:190:3683. 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:124:3806 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8705d84 r8:00000002 r7:60000113 r6:e8705d8c r5:85012400 r4:85012400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85012400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8705e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9cd80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85012400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ae378c r4:84ae3400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ae378c r4:84b98900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85012400 r8:84b9892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98900 r8:8027f5e8 r7:e46e9e60 r6:84b98980 r5:85012400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8705fb0 to 0xe8705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b7d7c0 INFO: task kworker/1:124:3806 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e6b3a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:3807 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:125 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8709d84 r8:00000002 r7:60000113 r6:e8709d8c r5:85013000 r4:85013000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85013000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e03bf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ae3f8c r4:84b98a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0551d28 to 0xe0551d70) r4:82ac11e4 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3808 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e870dd84 r8:00000002 r7:60000013 r6:e870dd8c r5:85013c00 r4:85013c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85013c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e870de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b89c80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85013c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b22b8c r4:84b22800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b22b8c r4:84b86b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013c00 r8:84b86bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86b80 r8:8027f5e8 r7:e46f5e60 r6:84b98b00 r5:85013c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe870dfb0 to 0xe870dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:223:3808 is blocked on a mutex likely owned by task kworker/0:190:3683. Exception stack(0xe0551d28 to 0xe0551d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:84b66900 task:kworker/0:224 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfb65000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8715fb0 to 0xe8715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b89b00 INFO: task kworker/0:224:3810 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e706e000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3812 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b86c80 r8:8027f5e8 r7:e46f5e60 r6:84b98c00 r5:85014800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0551d28 to 0xe0551d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0551dc0 r4:00000000 r5:00001000 r4:ec8e5000 r5:858c5b8c r4:858c5800 r4:84b6b680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:848e0000 r4:8291892c r4:00000000 r4:00000000 r5:00001000 r4:dfc25000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3817 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8721d84 r8:00000002 r7:60000013 r6:e8721d8c r5:848e1800 r4:848e1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8721e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04db000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8423b38c r4:8423b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8423b38c r4:84b86e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e1800 r8:84b86e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b86e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b86e00 r8:8027f5e8 r7:e871de60 r6:84b86e80 r5:848e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8721fb0 to 0xe8721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9cd40 INFO: task kworker/0:227:3817 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e771b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3818 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e46edd84 r8:00000002 r7:60000113 r6:e46edd8c r5:848e2400 r4:848e2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9cec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b23f8c r4:84b23c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e2400 r8:84b86f2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0551d28 to 0xe0551d70) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:3821 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:3821 tgid:3821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8729d84 r8:00000002 r7:60000013 r6:e8729d8c r5:848e3000 r4:848e3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8729e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505838c r4:85058000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505838c r4:84b97000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e3000 r8:84b9702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:230 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0509000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe8731fb0 to 0xe8731ff8) r4:84b95100 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 1d60: 80230ad4 80239bb0 800f0013 ffffffff [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848e4800 r4:8291892c [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0531000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e4800 r8:84b9722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97200 r8:8027f5e8 r7:e8731e60 r6:84b97280 r5:848e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8735fb0 to 0xe8735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b95300 INFO: task kworker/0:231:3826 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e81e5000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3827 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3827 tgid:3827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8739d84 r8:00000002 r7:60000013 r6:e8739d8c r5:848e5400 r4:848e5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8739e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b958c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505938c r4:85059000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505938c r4:84b97300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e5400 r8:84b9732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97300 r8:8027f5e8 r7:e8735e60 r6:84b97380 r5:848e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8739fb0 to 0xe8739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b95440 INFO: task kworker/0:232:3827 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0551d28 to 0xe0551d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:233 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0569000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:234 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:848e6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8741e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0591000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505978c r4:85059400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505978c r4:84b97500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e6c00 r8:84b9752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97500 r8:8027f5e8 r7:e8739e60 r6:84b97580 r5:848e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8741fb0 to 0xe8741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b956c0 INFO: task kworker/0:234:3832 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e8d3d000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3833 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8745d84 r8:00000002 r7:60000013 r6:e8745d8c r5:848e0c00 r4:848e0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8745e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95bc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059b8c r4:85059800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85059b8c r4:84b97600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e0c00 r8:84b9762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97600 r8:8027f5e8 r7:e8741e60 r6:84b97680 r5:848e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8745fb0 to 0xe8745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b95840 INFO: task kworker/0:235:3833 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e903b000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3835 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3835 tgid:3835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e874dd84 r8:00000002 r7:60000013 r6:e874dd8c r5:843e6000 r4:843e6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e874de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95d40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059f8c r4:85059c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85059f8c r4:84b97700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e6000 r8:84b9772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97700 r8:8027f5e8 r7:e8745e60 r6:84b97780 r5:843e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe874dfb0 to 0xe874dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b959c0 INFO: task kworker/0:236:3835 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e93df000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3837 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8751d84 r8:00000002 r7:60000013 r6:e8751d8c r5:843e6c00 r4:843e6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8751e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a38c r4:8505a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505a38c r4:84b97800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e6c00 r8:84b9782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97800 r8:8027f5e8 r7:e874de60 r6:84b97900 r5:843e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8751fb0 to 0xe8751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b95b40 INFO: task kworker/0:237:3837 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e9af2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3839 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8755d84 r8:00000002 r7:60000013 r6:e8755d8c r5:84a10000 r4:84a10000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a10000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8755e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0619000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a78c r4:8505a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505a78c r4:84b97880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a10000 r8:84b978ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97880 r8:8027f5e8 r7:e8751e60 r6:84b97980 r5:84a10000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8755fb0 to 0xe8755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b95d80 INFO: task kworker/0:238:3839 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: e9af2000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3841 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e8759d84 r8:00000002 r7:60000013 r6:e8759d8c r5:84a10c00 r4:84a10c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a10c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8759e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8701000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505af8c r4:8505ac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505af8c r4:84b97a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a10c00 r8:84b97a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97a00 r8:8027f5e8 r7:e8755e60 r6:84b97a80 r5:84a10c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8759fb0 to 0xe8759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baf000 INFO: task kworker/0:239:3841 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ea2b0000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:3843 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e875dd84 r8:00000002 r7:60000013 r6:e875dd8c r5:84a11800 r4:84a11800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a11800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e875de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a11800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ab8c r4:8505a800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505ab8c r4:84b97b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a11800 r8:84b97b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97b00 r8:8027f5e8 r7:e8759e60 r6:84b97b80 r5:84a11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe875dfb0 to 0xe875dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baf240 INFO: task kworker/0:240:3843 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ea8aa000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3845 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8769000 r5:8505b38c r4:8505b000 r10:61c88647 r9:84a12400 r8:84b97c2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baf180 INFO: task kworker/0:241:3845 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ea9ce000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3847 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:e876dd84 r8:00000002 r7:60000113 r6:e876dd8c r5:84a13000 r4:84a13000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a13000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e876de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea781000 r5:8505b78c r4:8505b400 r10:61c88647 r9:84a13000 r8:84b97d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84baf340 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:243 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea785e08 r5:00001000 r4:ea7a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506838c r4:85068000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506838c r4:84b97e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a13c00 r8:84b97e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b97e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97e00 r8:8027f5e8 r7:e876de60 r6:84b97e80 r5:84a13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea785fb0 to 0xea785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baf440 INFO: task kworker/0:243:3849 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb08f000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:244 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea791e08 r5:00001000 r4:ea78d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a14800 r8:84b97f2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a15400 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea799000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505bf8c r4:8505bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505bf8c r4:84bbd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a15400 r8:84bbd02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd000 r8:8027f5e8 r7:ea785e60 r6:84bbd080 r5:84a15400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea79dfb0 to 0xea79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baf7c0 INFO: task kworker/0:245:3853 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb35a000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:3855 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7a9d84 r8:00000002 r7:60000113 r6:ea7a9d8c r5:84a16000 r4:84a16000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a16000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baf980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a16000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506878c r4:85068400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506878c r4:84bbd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16000 r8:84bbd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd100 r8:8027f5e8 r7:ea785e60 r6:84bbd180 r5:84a16000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7a9fb0 to 0xea7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bafa80 INFO: task kworker/0:246:3855 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb7cb000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3857 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7b5d84 r8:00000002 r7:60000113 r6:ea7b5d8c r5:84a16c00 r4:84a16c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a16c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84baff40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7c9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85068f8c r4:85068c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85068f8c r4:84bbd200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16c00 r8:84bbd22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd200 r8:8027f5e8 r7:ea7a9e60 r6:84bbd280 r5:84a16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7b5fb0 to 0xea7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bafac0 INFO: task kworker/0:247:3857 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb7cb000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3859 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7c1d84 r8:00000002 r7:60000013 r6:ea7c1d8c r5:84a18000 r4:84a18000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a18000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bafe00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a18000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7bd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85068b8c r4:85068800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85068b8c r4:84bbd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a18000 r8:84bbd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd300 r8:8027f5e8 r7:ea7b5e60 r6:84bbd380 r5:84a18000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7c1fb0 to 0xea7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bafc80 INFO: task kworker/0:248:3859 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb9f6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:3861 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7cdd84 r8:00000002 r7:60000113 r6:ea7cdd8c r5:84a18c00 r4:84a18c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a18c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7ed000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85069b8c r4:85069800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85069b8c r4:84bbd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a18c00 r8:84bbd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd400 r8:8027f5e8 r7:ea7b5e60 r6:84bbd480 r5:84a18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7cdfb0 to 0xea7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fb4000 INFO: task kworker/0:249:3861 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: eb9f6000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3863 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7d9d84 r8:00000002 r7:60000113 r6:ea7d9d8c r5:84a19800 r4:84a19800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a19800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea7d5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506938c r4:85069000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506938c r4:84bbd500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a19800 r8:84bbd52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd500 r8:8027f5e8 r7:ea7cde60 r6:84bbd580 r5:84a19800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7d9fb0 to 0xea7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84baff80 INFO: task kworker/0:250:3863 is blocked on a mutex likely owned by task kworker/0:190:3683. task:kworker/0:190 state:R running task stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0551d28 to 0xe0551d70) 1d20: ec181000 ec8a9000 00000001 80239b98 7f1e1000 00000001 1d40: 82ac05a0 7f1e1000 ec8a9000 8280c930 82ac11c4 e0551da4 e0551da8 e0551d78 1d60: 80230ad4 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r4:e0551dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ea7e5d84 r8:00000002 r7:60000013 r6:ea7e5d8c r5:84a1a400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea7e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a1a400 r8:84bbd62c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c5b8c r4:858c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:84b6b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b680 r8:8027f5e8 r7:e0549e60 r6:84b6e800 r5:84be8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3868 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7fdd84 r8:00000002 r7:60000113 r6:ea7fdd8c r5:84a1b000 r4:84a1b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a1b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc78c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 r5:00001000 r4:ea81d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea7fdfb0 to 0xea7fdff8) r4:84bc7100 r10:82ac11c4 r9:84be8c00 r8:80200be4 r7:e0551d5c r6:ffffffff r5:84be8c00 r4:82ac11e4 r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e872de08 r5:00001000 r4:ea7f9000 r5:85069f8c r4:85069c00 r10:61c88647 r9:84a1bc00 r8:84bbd82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0551d28 to 0xe0551d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0551dc0 r5:e0551e08 r5:858c5b8c r4:858c5800 r10:61c88647 r9:84be8c00 r8:84b6b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ea809d84 r8:00000002 r7:60000113 r6:ea809d8c r5:84a1c800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:84a1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea805000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506a38c r4:8506a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506a38c r4:84bbd900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1c800 r8:84bbd92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbd900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbd900 r8:8027f5e8 r7:ea7fde60 r6:84bbd980 r5:84a1c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea809fb0 to 0xea809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc7540 INFO: task kworker/0:254:3870 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3873 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3873 tgid:3873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea815d84 r8:00000002 r7:60000113 r6:ea815d8c r5:84a1d400 r4:84a1d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a1d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea815e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a1d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea811000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506a78c r4:8506a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506a78c r4:84bbda00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1d400 r8:84bbda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbda00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbda00 r8:8027f5e8 r7:ea7fde60 r6:84bbda80 r5:84a1d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea815fb0 to 0xea815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc7640 INFO: task kworker/0:255:3873 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:3875 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea821d84 r8:00000002 r7:60000113 r6:ea821d8c r5:84a1e000 r4:84a1e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a1e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea821e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:84a1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r5:00001000 r4:ea841000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea821fb0 to 0xea821ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:257 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea829000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506af8c r4:8506ac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506af8c r4:84bbdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1ec00 r8:84bbdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbdc00 r8:8027f5e8 r7:ea821e60 r6:84bbdc80 r5:84a1ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea831fb0 to 0xea831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc77c0 INFO: task kworker/0:257:3876 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:3879 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84a08000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea82de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea84d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea82dfb0 to 0xea82dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:3881 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea851d84 r8:00000002 r7:60000013 r6:ea851d8c r5:84a08c00 r4:84a08c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a08c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea851e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8be40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506bf8c r4:8506bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506bf8c r4:84bbde00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08c00 r8:84bbde2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbde00 r10:00000000 r9:84bbde00 r8:8027f5e8 r7:ea82de60 r6:84bbde80 r5:84a08c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 900c0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:3883 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea861d84 r8:00000002 r7:60000013 r6:ea861d8c r5:84a09800 r4:84a09800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a09800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea861e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc7f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea859000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506bb8c r4:8506b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506bb8c r4:84bbdf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:84bbdf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bbdf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbdf00 r8:8027f5e8 r7:ea851e60 r6:84bbdf80 r5:84a09800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea861fb0 to 0xea861ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 task:kworker/0:261 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84a0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be2000 Exception stack(0xea869fb0 to 0xea869ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be1080 INFO: task kworker/0:261:3885 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:262:3887 blocked for more than 456 seconds. r4:84a0b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea86de08 r5:00001000 r4:dfc3d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea86dfb0 to 0xea86dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea845e08 r5:00001000 r4:dfcdd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a0bc00 r8:84be222c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:3891 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea871d84 r8:00000002 r7:60000113 r6:ea871d8c r5:84a0c800 r4:84a0c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea871e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd29000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85070f8c r4:85070c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85070f8c r4:84be2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:84be232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2300 r8:8027f5e8 r7:ea845e60 r6:84be2380 r5:84a0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea871fb0 to 0xea871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be13c0 INFO: task kworker/0:264:3891 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:3893 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea879e08 r5:00001000 r4:dfd9d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xea879fb0 to 0xea879ff8) r4:84be1500 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea87de08 r9:83018005 r8:84a0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:00001000 r4:dfde7000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be2500 r8:8027f5e8 r7:ea879e60 r6:84be2580 r5:84a0e000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:267 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85071b8c r4:85071800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85071b8c r4:84be2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:84be262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2600 r8:8027f5e8 r7:ea87de60 r6:84be2680 r5:84a0ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea881fb0 to 0xea881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be1780 INFO: task kworker/0:267:3897 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:3899 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea885d84 r8:00000002 r7:60000113 r6:ea885d8c r5:849f0000 r4:849f0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea885e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da400 r5:00001000 r4:dff47000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849f0000 r8:84be272c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfe5b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:270 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:849f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be1c00 INFO: task kworker/0:270:3902 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:3905 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea891d84 r8:00000002 r7:60000013 r6:ea891d8c r5:849f3c00 r4:849f3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea891e08 r5:00001000 r4:dfec7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8507278c r4:85072400 r4:84be2a00 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:272:3907 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea895d84 r8:00000002 r7:60000013 r6:ea895d8c r5:849f5400 r4:849f5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea895e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:00001000 r4:dff2d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be2b00 r8:8027f5e8 r7:ea885e60 r6:84be2b80 r5:849f5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 900c0113 ffffffff r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea899d84 r8:00000002 r7:60000113 r6:ea899d8c r5:849f4800 r4:849f4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea899e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850da640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e028f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507338c r4:85073000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507338c r4:84be2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f4800 r8:84be2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2c00 r8:8027f5e8 r7:ea885e60 r6:84be2c80 r5:849f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea899fb0 to 0xea899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da000 INFO: task kworker/0:273:3909 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 task:kworker/0:274 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e02ad000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:849f6c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02d3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85073b8c r4:85073800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85073b8c r4:84be2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f6c00 r8:84be2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2e00 r8:8027f5e8 r7:ea889e60 r6:84be2e80 r5:849f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea89dfb0 to 0xea89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850da5c0 INFO: task kworker/0:275:3914 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:3916 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8a1d84 r8:00000002 r7:60000113 r6:ea8a1d8c r5:849f3000 r4:849f3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850daac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e035b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85073f8c r4:85073c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85073f8c r4:84be2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3000 r8:84be2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be2f00 r8:8027f5e8 r7:ea89de60 r6:84be2f80 r5:849f3000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:3918 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e0455000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:850dc000 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 900c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e038b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:3921 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8b1d84 r8:00000002 r7:60000113 r6:ea8b1d8c r5:850a8c00 r4:850a8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e042f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85080f8c r4:85080c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85080f8c r4:850dc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8c00 r8:850dc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc200 r8:8027f5e8 r7:ea8a5e60 r6:850dc280 r5:850a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b1fb0 to 0xea8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dac00 INFO: task kworker/0:279:3921 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:126 state:D stack:0 pid:3923 tgid:3923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8b5d84 r8:00000002 r7:60000013 r6:ea8b5d8c r5:850a9800 r4:850a9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508078c r4:85080400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508078c r4:84b98d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a9800 r8:84b98d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98d00 r8:8027f5e8 r7:e46e9e60 r6:850dc300 r5:850a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8b5fb0 to 0xea8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd0640 INFO: task kworker/1:126:3923 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/1:127:3926 blocked for more than 456 seconds. r10:82918930 r9:ea8b9d84 r8:00000002 r7:60000113 r6:ea8b9d8c r5:850aa400 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:df981000 r5:85025f8c r4:85025c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:128:3927 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:128 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8bdd84 r8:00000002 r7:60000113 r6:ea8bdd8c r5:850ab000 r4:850ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb880 r5:00001000 r4:dfb1d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 900c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8ade08 r4:00000000 r5:00001000 r4:e04b3000 r5:8508178c r4:85081400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de1c0 INFO: task kworker/0:280:3930 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 INFO: task kworker/0:281:3932 blocked for more than 456 seconds. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0521000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85081b8c r4:85081800 r7:dddced80 r6:83018000 r5:85081b8c r4:850dc600 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e469d000 r5:85081f8c r4:85081c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85081f8c r4:850dc700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:850dc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc700 r8:8027f5e8 r7:ea8c9e60 r6:850dc780 r5:850ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8cdfb0 to 0xea8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de2c0 INFO: task kworker/0:282:3934 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:3936 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:283 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8c1d84 r8:00000002 r7:600f0013 r6:ea8c1d8c r5:850aec00 r4:850aec00 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508238c r4:85082000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508238c r4:850dc800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:850dc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dc800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dc800 r8:8027f5e8 r7:ea8cde60 r6:850dc880 r5:850aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8c1fb0 to 0xea8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850de480 INFO: task kworker/0:283:3936 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea8e1000 r5:85082b8c r4:85082800 r10:61c88647 r9:850b8c00 r8:850dc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850de540 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d60: 80230ad4 80239bb0 900c0113 ffffffff r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:3939 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8d9d84 r8:00000002 r7:60000113 r6:ea8d9d8c r5:850b9800 r4:850b9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850deb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508278c r4:85082400 r7:dddced80 r6:83018000 r5:8508278c r4:850dca00 Exception stack(0xea8d9fb0 to 0xea8d9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850ba400 r4:8291892c [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea8ed000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850dcb00 r8:8027f5e8 r7:ea8d5e60 r6:850dcb80 r5:850ba400 Workqueue: events bpf_prog_free_deferred 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:3944 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea8f1d84 r8:00000002 r7:60000013 r6:ea8f1d8c r5:850bb000 r4:850bb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea8f1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850deec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508338c r4:85083000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508338c r4:850dcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bb000 r8:850dcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dcc00 r8:8027f5e8 r7:ea8d1e60 r6:850dcc80 r5:850bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8f1fb0 to 0xea8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850deb40 INFO: task kworker/0:287:3944 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:288:3946 blocked for more than 456 seconds. [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850de500 r5:00001000 r4:df95d000 r7:dddced80 r6:83018000 r5:8508378c r4:850dcd00 Exception stack(0xea8fdfb0 to 0xea8fdff8) Workqueue: events bpf_prog_free_deferred 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 task:kworker/0:289 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd0580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083b8c r4:85083800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083b8c r4:850dce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bc800 r8:850dce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dce00 r8:8027f5e8 r7:ea8fde60 r6:850dce80 r5:850bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea8e5fb0 to 0xea8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dee80 INFO: task kworker/0:289:3948 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ea909d84 r8:00000002 r7:60000113 r6:ea909d8c r5:850bd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85083f8c r4:85083c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85083f8c r4:850dcf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bd400 r8:850dcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dcf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dcf00 r8:8027f5e8 r7:ea8e5e60 r6:850dcf80 r5:850bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fb140 INFO: task kworker/0:290:3950 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:291:3953 blocked for more than 456 seconds. [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfba5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850dc380 r8:8027f5e8 r7:ea909e60 r6:850fb000 r5:850bec00 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:292 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e46f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa29000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508c38c r4:8508c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508c38c r4:850fb080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b8000 r8:850fb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fb080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb080 r8:8027f5e8 r7:ea90de60 r6:850fb100 r5:850b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe46f9fb0 to 0xe46f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f4080 INFO: task kworker/0:292:3954 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:129:3958 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:129 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea915d84 r8:00000002 r7:60000113 r6:ea915d8c r5:850c0c00 r4:850c0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ebf40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea793000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e3f8c r4:844e3c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e3f8c r4:84b98e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c0c00 r8:84b98eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b98e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b98e80 r8:8027f5e8 r7:ea8b9e60 r6:850fb180 r5:850c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:293 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea919e08 r5:00001000 r4:dfc27000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 900c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:294 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea7f1d84 r8:00000002 r7:600f0013 r6:ea7f1d8c r5:850c2400 r4:850c2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea7f1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508d38c r4:8508d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508d38c r4:850fb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c2400 r8:850fb32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb300 r8:8027f5e8 r7:ea919e60 r6:850fb380 r5:850c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea7f1fb0 to 0xea7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f4700 INFO: task kworker/0:294:3961 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:3963 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea911d84 r8:00000002 r7:60000113 r6:ea911d8c r5:850c3000 r4:850c3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508d78c r4:8508d400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508d78c r4:850fb400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c3000 r8:850fb42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fb400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb400 r8:8027f5e8 r7:ea7f1e60 r6:850fb480 r5:850c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea911fb0 to 0xea911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f4a00 INFO: task kworker/0:295:3963 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:296 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:ea91dd84 r8:00000002 r7:60000113 r6:ea91dd8c r5:850c3c00 r4:850c3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0515000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508df8c r4:8508dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508df8c r4:850fb500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c3c00 r8:850fb52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fb500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fb500 r8:8027f5e8 r7:ea911e60 r6:850fb580 r5:850c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f4b40 INFO: task kworker/0:296:3965 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e04f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:3969 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea921d84 r8:00000002 r7:60000013 r6:ea921d8c r5:850c5400 r4:850c5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0567000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8508e38c r4:8508e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:850c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:850fe1c0 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:3973 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0581000 r5:8508e78c r4:8508e400 r4:850fb900 1fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850c0000 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0617000 r7:dddced80 r6:83018000 r5:8508f78c r4:850fba00 r4:00000001 r4:850fe300 Workqueue: events bpf_prog_free_deferred 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:3977 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:3977 tgid:3977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea939d84 r8:00000002 r7:60000113 r6:ea939d8c r5:850ae000 r4:850ae000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ae000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fe5c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508ef8c r4:8508ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508ef8c r4:850fbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ae000 r8:850fbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbb00 r8:8027f5e8 r7:ea935e60 r6:850fbb80 r5:850ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea939fb0 to 0xea939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fe300 INFO: task kworker/0:302:3977 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e05fb000 r5:8508f38c r4:8508f000 r10:61c88647 r9:85015400 r8:850fbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:85016c00 r4:85016c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85016c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850feb80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85016c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508ff8c r4:8508fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508ff8c r4:850fbc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85016c00 r8:850fbcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fbc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbc80 r8:8027f5e8 r7:ea935e60 r6:84b98f80 r5:85016c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fe600 INFO: task kworker/0:304:3980 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 7fa69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 900c0113 ffffffff r5:900c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:3983 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea955d84 r8:00000002 r7:60000013 r6:ea955d8c r5:84bfe000 r4:84bfe000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bfe000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea955e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fea40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bfe000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4681000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8508fb8c r4:850fbd00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 900c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e8719000 r7:dddced80 r6:83018000 r5:8515038c r4:850fbd80 Exception stack(0xea959fb0 to 0xea959ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 900c0113 ffffffff r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:3987 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:3987 tgid:3987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea95dd84 r8:00000002 r7:60000113 r6:ea95dd8c r5:850b0000 r4:850b0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f4440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7a1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85150f8c r4:85150c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85150f8c r4:850fbe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b0000 r8:850fbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fbe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbe00 r8:8027f5e8 r7:ea959e60 r6:85112080 r5:850b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fea80 INFO: task kworker/0:307:3987 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e8765000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515078c r4:85150400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515078c r4:850fbe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b0c00 r8:850fbeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fbe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fbe80 r8:8027f5e8 r7:ea95de60 r6:85112100 r5:850b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850fecc0 INFO: task kworker/0:308:3988 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:3991 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea94dd84 r8:00000002 r7:60000113 r6:ea94dd8c r5:850b1800 r4:850b1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:850b1800 r8:850fbf2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 task:kworker/1:130 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851154c0 r5:8502438c r4:85024000 r10:00000000 r9:85112200 r8:8027f5e8 r7:ea8b9e60 r6:85112280 r5:850b2400 Workqueue: events bpf_prog_free_deferred r4:e0545dc0 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:3995 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea96dd84 r8:00000002 r7:60000013 r6:ea96dd8c r5:850b3c00 r4:850b3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110340 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:3996 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea971d84 r8:00000002 r7:60000013 r6:ea971d8c r5:850b4800 r4:850b4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851100c0 r5:00001000 r4:ea7af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515138c r4:85111000 r4:85111000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:312 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea975d84 r8:00000002 r7:60000013 r6:ea975d8c r5:850b6000 r4:850b6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea975e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85151b8c r4:85151800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85151b8c r4:85111080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b6000 r8:851110ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111080 r8:8027f5e8 r7:ea96de60 r6:85112400 r5:850b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea975fb0 to 0xea975ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Call trace: r5:850b6c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8502478c r4:85024400 r10:61c88647 r9:850b6c00 r8:8511112c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4004 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:850b5400 r4:850b5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851107c0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515238c r4:85111180 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4005 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r10:82918930 r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:850b3000 r4:850b3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85151f8c r4:85151c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85151f8c r4:85111200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b3000 r8:8511122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111200 r8:8027f5e8 r7:ea97de60 r6:85112580 r5:850b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85110480 INFO: task kworker/0:315:4005 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85018000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 INFO: task kworker/0:316:4011 blocked for more than 456 seconds. [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8501b000 r8:851112ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111280 r8:8027f5e8 r7:ea97de60 r6:85112700 r5:8501b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:317 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515278c r4:85111300 r10:00000000 r9:85111300 r8:8027f5e8 r7:ea98de60 r6:85112780 r5:8501bc00 INFO: task kworker/0:317:4012 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8501a400 r8:851113ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85110940 INFO: task kworker/0:318:4015 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:85018c00 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdfb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85152f8c r4:85152c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85152f8c r4:85111400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85018c00 r8:8511142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111400 r8:8027f5e8 r7:ea99de60 r6:85112880 r5:85018c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r5:84ab1b8c r4:84ab1800 Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff17000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85153b8c r4:85153800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85153b8c r4:85111480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501d400 r8:851114ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111480 r8:8027f5e8 r7:ea99de60 r6:85112900 r5:8501d400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515378c r4:85111500 r4:85110b00 r4:00000000 r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4022 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9a1d84 r8:00000002 r7:60000013 r6:ea9a1d8c r5:850cb000 r4:850cb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fb040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0279000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8515438c r4:85111600 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85153f8c r4:85153c00 r10:00000000 r9:85111700 r8:8027f5e8 r7:ea9a1e60 r6:85111780 r5:850cbc00 Exception stack(0xe0545d28 to 0xe0545d70) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4026 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 r5:850cc800 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f040 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515478c r4:85111800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4029 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:850cd400 r4:850cd400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cd400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515538c r4:85111900 r10:00000000 r9:85111900 r8:8027f5e8 r7:ea9b1e60 r6:85111980 r5:850cd400 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4030 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:850ce000 r4:850ce000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ce000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02c3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85154b8c r4:85154800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85154b8c r4:85111a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4032 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4032 tgid:4032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9b5d84 r8:00000002 r7:60000013 r6:ea9b5d8c r5:850c8c00 r4:850c8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e035d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85154f8c r4:85154c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85154f8c r4:85111b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8c00 r8:85111b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111b00 r8:8027f5e8 r7:ea9b9e60 r6:85111b80 r5:850c8c00 r4:00000001 Exception stack(0xea9b5fb0 to 0xea9b5ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 r5:00001000 r4:e038d000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9c5d84 r8:00000002 r7:60000113 r6:ea9c5d8c r5:850c9800 r4:850c9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511f940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0415000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515578c r4:85155400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515578c r4:85111c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c9800 r8:85111c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111c00 r8:8027f5e8 r7:ea9b9e60 r6:85111c80 r5:850c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511f380 INFO: task kworker/0:328:4034 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:329 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r5:00001000 r4:e04ab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85155f8c r4:85155c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85155f8c r4:85111d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cec00 r8:85111d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111d00 r8:8027f5e8 r7:ea9c5e60 r6:85111d80 r5:850cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511f7c0 INFO: task kworker/0:329:4037 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4038 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9cdd84 r8:00000002 r7:60000113 r6:ea9cdd8c r5:850c8000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511fac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e043d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85155b8c r4:85155800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85155b8c r4:85111e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8000 r8:85111e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111e00 r8:8027f5e8 r7:ea9c9e60 r6:85111e80 r5:850c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511f7c0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:331 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85016000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515638c r4:85156000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515638c r4:85111f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85016000 r8:85111f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85111f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85111f00 r8:8027f5e8 r7:ea9c9e60 r6:85111f80 r5:85016000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511f9c0 INFO: task kworker/0:331:4041 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8501e000 r4:8291892c r4:00000000 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8502538c r4:85112980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501e000 r8:851129ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85112980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85112980 r8:8027f5e8 r7:ea8b9e60 r6:85112a00 r5:8501e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85129480 INFO: task kworker/1:132:4042 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515678c r4:8512f000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4046 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:8501c800 r4:8501c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8501c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea849000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515778c r4:85157400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515778c r4:8512f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501c800 r8:8512f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f080 r8:8027f5e8 r7:ea9e5e60 r6:85112b00 r5:8501c800 Exception stack(0xea9e9fb0 to 0xea9e9ff8) INFO: task kworker/0:333:4046 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4047 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9edd84 r8:00000002 r7:60000113 r6:ea9edd8c r5:851c0000 r4:851c0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851150c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46db000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85156b8c r4:85156800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85156b8c r4:8512f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0000 r8:8512f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f100 r8:8027f5e8 r7:ea9e9e60 r6:85112b80 r5:851c0000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4049 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:851c1800 r4:851c1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fefc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea81b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85156f8c r4:85156c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85156f8c r4:8512f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c1800 r8:8512f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f180 r8:8027f5e8 r7:ea9e9e60 r6:85112c00 r5:851c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511ff80 INFO: task kworker/0:335:4049 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:336:4051 blocked for more than 457 seconds. r5:851c3000 r4:8291892c r4:00000000 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8515738c r4:8512f200 Exception stack(0xea9fdfb0 to 0xea9fdff8) INFO: task kworker/0:336:4051 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4054 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa09d84 r8:00000002 r7:60000013 r6:eaa09d8c r5:851c4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85157b8c r4:8512f280 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851341c0 INFO: task kworker/0:337:4054 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:851c3c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8db000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85157f8c r4:85157c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85157f8c r4:8512f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3c00 r8:8512f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f300 r8:8027f5e8 r7:eaa09e60 r6:85112d80 r5:851c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851342c0 INFO: task kworker/0:338:4056 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:339 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134700 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515c38c r4:8512f380 r10:00000000 r9:8512f380 r8:8027f5e8 r7:eaa11e60 r6:85112e00 r5:851c5400 INFO: task kworker/0:339:4057 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4059 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:851c0c00 r4:851c0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515c78c r4:8515c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515c78c r4:8512f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0c00 r8:8512f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f400 r8:8027f5e8 r7:eaa15e60 r6:85112e80 r5:851c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134340 INFO: task kworker/0:340:4059 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:4062 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:851c6c00 r4:851c6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515cb8c r4:8512f480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6c00 r8:8512f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f480 r8:8027f5e8 r7:eaa1de60 r6:85112f00 r5:851c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851346c0 INFO: task kworker/0:341:4062 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515d38c r4:8515d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515d38c r4:8512f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c2400 r8:8512f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f500 r8:8027f5e8 r7:eaa25e60 r6:85112f80 r5:851c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84898c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515cf8c r4:8515cc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515cf8c r4:8512f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84898c00 r8:8512f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f580 r8:8027f5e8 r7:eaa35e60 r6:8512f600 r5:84898c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134740 INFO: task kworker/0:343:4065 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:344 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515d78c r4:8512f680 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851c8c00 r4:8291892c [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8515db8c r4:8512f780 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134b00 INFO: task kworker/0:345:4070 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4072 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eaa6dd84 r8:00000002 r7:60000013 r6:eaa6dd8c r5:851c8000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515e38c r4:8515e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515e38c r4:8512f800 r4:8512f800 r10:00000000 r9:8512f800 r8:8027f5e8 r7:eaa5de60 r6:8514a080 r5:851c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134d40 INFO: task kworker/0:346:4072 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4074 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa7dd84 r8:00000002 r7:60000013 r6:eaa7dd8c r5:851cb000 r4:851cb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85134fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa65000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515df8c r4:8515dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515df8c r4:8512f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cb000 r8:8512f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f880 r8:8027f5e8 r7:eaa6de60 r6:8514a100 r5:851cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134d40 INFO: task kworker/0:347:4074 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4075 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:851cbc00 r5:851cbc00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8515e78c r4:8512f900 r4:8512f900 r10:00000000 r9:8512f900 r8:8027f5e8 r7:eaa6de60 r6:8514a180 r5:851cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa81fb0 to 0xeaa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85134d40 INFO: task kworker/0:348:4075 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4078 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:851c9800 r4:851c9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515eb8c r4:8515e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515eb8c r4:8512f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c9800 r8:8512f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512f980 r8:8027f5e8 r7:eaa81e60 r6:8514a200 r5:851c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8100 INFO: task kworker/0:349:4078 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4080 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaa1d84 r8:00000002 r7:60000013 r6:eaaa1d8c r5:851cc800 r5:851cc800 r4:8291892c [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaa9d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ef8c r4:8515ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515ef8c r4:8512fa00 r10:61c88647 r9:851cc800 r8:8512fa2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4082 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:851cd400 r4:851cd400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cd400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f85c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515f38c r4:8515f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515f38c r4:8512fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cd400 r8:8512faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fa80 r8:8027f5e8 r7:eaaa1e60 r6:8514a300 r5:851cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4084 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa79d84 r8:00000002 r7:60000013 r6:eaa79d8c r5:8489bc00 r4:8489bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515f78c r4:8515f400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515f78c r4:8512fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489bc00 r8:8512fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fb00 r8:8027f5e8 r7:eaaade60 r6:8512fb80 r5:8489bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8480 INFO: task kworker/0:352:4084 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4086 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa59d84 r8:00000002 r7:60000013 r6:eaa59d8c r5:8489c800 r4:8489c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516038c r4:85160000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516038c r4:8512fc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489c800 r8:8512fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fc00 r8:8027f5e8 r7:eaa79e60 r6:8512fc80 r5:8489c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8580 INFO: task kworker/0:353:4086 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:4089 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:851ce000 r4:851ce000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ce000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515ff8c r4:8515fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515ff8c r4:8514a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ce000 r8:8514a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a380 r8:8027f5e8 r7:ea8b9e60 r6:8514a400 r5:851ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f9480 INFO: task kworker/1:133:4089 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4090 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:851cec00 r4:851cec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8515fb8c r4:8515f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515fb8c r4:8512fd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cec00 r8:8512fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fd00 r8:8027f5e8 r7:eaa59e60 r6:8514a480 r5:851cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8700 INFO: task kworker/0:354:4090 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:4092 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:851ca400 r4:851ca400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ca400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f98c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502578c r4:85025400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502578c r4:8514a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ca400 r8:8514a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a500 r8:8027f5e8 r7:ea8b9e60 r6:8514a580 r5:851ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f9640 INFO: task kworker/1:134:4092 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4093 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaae1d84 r8:00000002 r7:60000013 r6:eaae1d8c r5:8489b000 r4:8489b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516138c r4:85161000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516138c r4:8512fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489b000 r8:8512fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fd80 r8:8027f5e8 r7:eaa59e60 r6:8512fe00 r5:8489b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8b40 INFO: task kworker/0:355:4093 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4095 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:8489e000 r4:8489e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f8fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516078c r4:85160400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516078c r4:8512fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489e000 r8:8512feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8512fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8512fe80 r8:8027f5e8 r7:eaae1e60 r6:8512ff00 r5:8489e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8b40 INFO: task kworker/0:356:4095 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4098 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab09d84 r8:00000002 r7:60000013 r6:eab09d8c r5:8489d400 r4:8489d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85129f00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8489d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85160b8c r4:85160800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85160b8c r4:8512ff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489d400 r8:8512ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xeab09fb0 to 0xeab09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80294000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4099 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:8489a400 r4:8489a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8489a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f4c0 r5:00001000 r4:df9df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85160f8c r4:85160c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8489a400 r8:851450ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f8c40 INFO: task kworker/0:358:4099 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:135:4101 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:135 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:850be000 r4:850be000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850be000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f99c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85025b8c r4:85025800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85025b8c r4:8514a600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850be000 r8:8514a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a600 r8:8027f5e8 r7:ea8b9e60 r6:85145180 r5:850be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f97c0 INFO: task kworker/1:135:4101 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfa13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502638c r4:85026000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8502638c r4:8514a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6000 r8:8514a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a680 r8:8027f5e8 r7:df9e5e60 r6:8514a700 r5:851c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f9980 INFO: task kworker/1:136:4104 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:359:4106 blocked for more than 457 seconds. r4:8501ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516178c r4:85161400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516178c r4:85145200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501ec00 r8:8514522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145200 r8:8027f5e8 r7:eaae1e60 r6:8514a780 r5:8501ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f280 INFO: task kworker/0:359:4106 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4110 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab39d84 r8:00000002 r7:60000013 r6:eab39d8c r5:851d1800 r4:851d1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f8c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85161b8c r4:85161800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85161b8c r4:85145280 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:4113 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab41d84 r8:00000002 r7:60000113 r6:eab41d8c r5:851d0c00 r4:851d0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:e8717000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85163f8c r4:85163c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85163f8c r4:85145300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d0c00 r8:8514532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145300 r8:8027f5e8 r7:eab39e60 r6:8514a880 r5:851d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f880 INFO: task kworker/0:361:4113 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:851d2400 r4:851d2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513fa00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85161f8c r4:85161c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85161f8c r4:85145380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d2400 r8:851453ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145380 r8:8027f5e8 r7:eab41e60 r6:8514a900 r5:851d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f880 INFO: task kworker/0:362:4114 is blocked on a mutex likely owned by task kworker/1:97:3681. r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eab49d84 r8:00000002 r7:60000013 r6:eab49d8c r5:851d3000 r4:00000000 r9:83018005 r8:851d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:00001000 r4:e04e7000 r5:8516238c r4:85162000 r7:dddced80 r6:83018000 r5:8516238c r4:85145400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d3000 r8:8514542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145400 r8:8027f5e8 r7:eab41e60 r6:8514aa00 r5:851d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f980 INFO: task kworker/0:363:4115 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:800c0113 r4:80239bb0 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:851d3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r5:00001000 r4:e0643000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851d3c00 r8:8514a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514a980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514a980 r8:8027f5e8 r7:df9e5e60 r6:8514aa80 r5:851d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851f9e40 INFO: task kworker/1:137:4116 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 INFO: task kworker/0:364:4118 blocked for more than 457 seconds. Call trace: r4:851d4800 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513fd00 r5:00001000 r4:e0507000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4120 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:851d6000 r4:851d6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513fe40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0555000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85162b8c r4:85162800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85162b8c r4:85145500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d6000 r8:8514552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145500 r8:8027f5e8 r7:eab41e60 r6:8514ab80 r5:851d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513fb00 INFO: task kworker/0:365:4120 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4122 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab61d84 r8:00000002 r7:60000013 r6:eab61d8c r5:851d0000 r4:851d0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513ff80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0589000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85162f8c r4:85162c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85162f8c r4:85145580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d0000 r8:851455ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145580 r8:8027f5e8 r7:eab41e60 r6:8514ac00 r5:851d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:851d6c00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516338c r4:85163000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516338c r4:85145600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d6c00 r8:8514562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145600 r8:8027f5e8 r7:eab41e60 r6:8514ac80 r5:851d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f900 INFO: task kworker/0:367:4124 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:368 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r5:00001000 r4:e05e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8516378c r4:85145680 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:368:4126 is blocked on a mutex likely owned by task kworker/1:97:3681. Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eab31d84 r8:00000002 r7:60000113 r6:eab31d8c r5:8489ec00 r4:00000000 r9:83018005 r8:8489ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:00001000 r4:e46e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85163b8c r4:85163800 r7:dddced80 r6:83018000 r5:85163b8c r4:85145700 r10:61c88647 r9:8489ec00 r8:8514572c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab31fb0 to 0xeab31ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:370:4132 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:84898000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb680 r5:00001000 r4:ea79f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84898000 r8:8514582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fb1c0 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:851d8000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea83f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85172b8c r4:8514ad80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851da400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r5:00001000 r4:e8767000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c38c r4:8516c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516c38c r4:85145900 r10:61c88647 r9:851da400 r8:8514592c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea789000 r5:8516c78c r4:8516c400 r4:85145980 Exception stack(0xeab8dfb0 to 0xeab8dff8) INFO: task kworker/0:372:4136 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:851db000 r4:00000000 r4:00000000 r5:00001000 r4:ea7b7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8516cf8c r4:85145a00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:373:4138 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4140 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:851dc800 r4:851dc800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dc800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:374:4140 is blocked on a mutex likely owned by task kworker/1:97:3681. r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:851dd400 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:851dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:00001000 r4:ea7c7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d38c r4:8516d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516d38c r4:85145b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:85145b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145b00 r8:8027f5e8 r7:eab95e60 r6:85207080 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fb640 INFO: task kworker/0:375:4142 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:4143 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:851dec00 r4:851dec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d78c r4:8516d400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516d78c r4:85145b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dec00 r8:85145bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145b80 r8:8027f5e8 r7:eaba5e60 r6:85207100 r5:851dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fb640 INFO: task kworker/0:376:4143 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851d9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbbc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516db8c r4:8516d800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516db8c r4:85145c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d9800 r8:85145c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851de000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea80b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516df8c r4:8516dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516df8c r4:85145c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851de000 r8:85145cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145c80 r8:8027f5e8 r7:eab9de60 r6:85207200 r5:851de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fbc40 INFO: task kworker/0:378:4148 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4150 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eabc5d84 r8:00000002 r7:60000013 r6:eabc5d8c r5:851e0c00 r5:851e0c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbe40 r5:00001000 r4:ea94f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516e38c r4:8516e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851e0c00 r8:85145d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145d00 r8:8027f5e8 r7:eab9de60 r6:85207280 r5:851e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fbb80 INFO: task kworker/0:379:4150 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4152 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:851e0000 r4:851e0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbf40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516e78c r4:8516e400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516e78c r4:85145e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e0000 r8:85145e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145e00 r8:8027f5e8 r7:eab9de60 r6:85207300 r5:851e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851fbc80 INFO: task kworker/0:380:4152 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4154 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea9ddd84 r8:00000002 r7:60000113 r6:ea9ddd8c r5:851e1800 r4:851e1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516eb8c r4:8516e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516eb8c r4:85145d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e1800 r8:85145dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145d80 r8:8027f5e8 r7:eab9de60 r6:85207380 r5:851e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f000 INFO: task kworker/0:381:4154 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4156 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4156 tgid:4156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa01d84 r8:00000002 r7:60000013 r6:eaa01d8c r5:851e3c00 r4:851e3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852142c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516f38c r4:8516f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516f38c r4:85145e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e3c00 r8:85145eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145e80 r8:8027f5e8 r7:eab9de60 r6:85207400 r5:851e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8513f000 INFO: task kworker/0:382:4156 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4158 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaa45d84 r8:00000002 r7:60000113 r6:eaa45d8c r5:851e4800 r4:851e4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e033d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85170b8c r4:85170800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85170b8c r4:85145f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e4800 r8:85145f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145f00 r8:8027f5e8 r7:eaa01e60 r6:85207480 r5:851e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa45fb0 to 0xeaa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214040 INFO: task kworker/0:383:4158 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80781000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4160 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:851e5400 r4:851e5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe67000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516f78c r4:8516f400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516f78c r4:85145f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e5400 r8:85145fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85145f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85145f80 r8:8027f5e8 r7:eaa45e60 r6:85207500 r5:851e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214140 INFO: task kworker/0:384:4160 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4162 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabd1d84 r8:00000002 r7:60000013 r6:eabd1d8c r5:851e3000 r4:851e3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeaf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516fb8c r4:8516f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516fb8c r4:85218000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e3000 r8:8521802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218000 r8:8027f5e8 r7:eaa45e60 r6:85207580 r5:851e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214280 INFO: task kworker/0:385:4162 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4164 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:851e2400 r4:851e2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ff8c r4:8516fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8516ff8c r4:85218080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e2400 r8:852180ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218080 r8:8027f5e8 r7:eaa45e60 r6:85207600 r5:851e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852143c0 INFO: task kworker/0:386:4164 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4166 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:851e6000 r4:851e6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852147c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e027b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517038c r4:85170000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517038c r4:85218100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e6000 r8:8521812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218100 r8:8027f5e8 r7:eaa45e60 r6:85207680 r5:851e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214700 INFO: task kworker/0:387:4166 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4168 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabe9d84 r8:00000002 r7:60000013 r6:eabe9d8c r5:851e6c00 r4:851e6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852148c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02b7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517078c r4:85170400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517078c r4:85218180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e6c00 r8:852181ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218180 r8:8027f5e8 r7:eaa45e60 r6:85207700 r5:851e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214880 INFO: task kworker/0:388:4168 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4170 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:85198000 r4:85198000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85198000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03b7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85170f8c r4:85170c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85170f8c r4:85218200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85198000 r8:8521822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218200 r8:8027f5e8 r7:eaa45e60 r6:85218280 r5:85198000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214780 INFO: task kworker/0:389:4170 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:4172 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:85198c00 r4:85198c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85198c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517138c r4:85171000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517138c r4:85218300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85198c00 r8:8521832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218300 r8:8027f5e8 r7:eab79e60 r6:85218380 r5:85198c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214ac0 INFO: task kworker/0:390:4172 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4175 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabf1d84 r8:00000002 r7:60000013 r6:eabf1d8c r5:85199800 r4:85199800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85199800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fa00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85199800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85173f8c r4:85173c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85173f8c r4:85218400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85199800 r8:8521842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218400 r8:8027f5e8 r7:eabede60 r6:85218480 r5:85199800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214c40 INFO: task kworker/0:391:4175 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4176 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4176 tgid:4176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:851e8000 r4:851e8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214e80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0431000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517178c r4:85171400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517178c r4:85218500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8000 r8:8521852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218500 r8:8027f5e8 r7:eabf1e60 r6:85207780 r5:851e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214dc0 INFO: task kworker/0:392:4176 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4178 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac11d84 r8:00000002 r7:60000113 r6:eac11d8c r5:851e8c00 r4:851e8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171b8c r4:85171800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85171b8c r4:85218580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e8c00 r8:852185ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218580 r8:8027f5e8 r7:eabf1e60 r6:85207800 r5:851e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214f40 INFO: task kworker/0:393:4178 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:4180 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:851e9800 r4:851e9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851e9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e469b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85171f8c r4:85171c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85171f8c r4:85218600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851e9800 r8:8521862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218600 r8:8027f5e8 r7:eabf1e60 r6:85207880 r5:851e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85214e00 INFO: task kworker/0:394:4180 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4182 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac45d84 r8:00000002 r7:60000013 r6:eac45d8c r5:851ea400 r4:851ea400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ea400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea823000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517278c r4:85172400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517278c r4:85218680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ea400 r8:852186ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218680 r8:8027f5e8 r7:eabf1e60 r6:85207900 r5:851ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149f80 INFO: task kworker/0:395:4182 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4185 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:851ebc00 r4:851ebc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ebc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea855000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85172f8c r4:85172c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85172f8c r4:85218700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ebc00 r8:8521872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218700 r8:8027f5e8 r7:eabf1e60 r6:85207980 r5:851ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f080 INFO: task kworker/0:396:4185 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:4187 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:851eb000 r4:851eb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851eb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85026b8c r4:85026800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85026b8c r4:85207a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851eb000 r8:85207a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85207a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207a00 r8:8027f5e8 r7:df9e5e60 r6:85207a80 r5:851eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521a780 INFO: task kworker/1:139:4187 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4189 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4189 tgid:4189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac79d84 r8:00000002 r7:60000013 r6:eac79d8c r5:851ec800 r4:851ec800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ec800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f5c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517338c r4:85173000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517338c r4:85218780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ec800 r8:852187ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218780 r8:8027f5e8 r7:eabf1e60 r6:85207b00 r5:851ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f380 INFO: task kworker/0:397:4189 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4191 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:851ed400 r4:851ed400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ed400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517378c r4:85173400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517378c r4:85218800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ed400 r8:8521882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218800 r8:8027f5e8 r7:eabf1e60 r6:85207b80 r5:851ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f440 INFO: task kworker/0:398:4191 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4193 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:8519a400 r4:8519a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea987000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85173b8c r4:85173800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85173b8c r4:85218880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519a400 r8:852188ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218880 r8:8027f5e8 r7:eabf1e60 r6:85218900 r5:8519a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f580 INFO: task kworker/0:399:4193 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:4197 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:8519c800 r4:8519c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517538c r4:85175000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517538c r4:85218980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519c800 r8:852189ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218980 r8:8027f5e8 r7:eabf1e60 r6:85218a00 r5:8519c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f880 INFO: task kworker/0:400:4197 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:4198 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:8519d400 r4:8519d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fb700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519d400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85026f8c r4:85026c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85026f8c r4:85207c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519d400 r8:85207c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85207c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207c00 r8:8027f5e8 r7:df9e5e60 r6:85218a80 r5:8519d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8521a040 INFO: task kworker/1:140:4198 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:4200 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:8519e000 r4:8519e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517438c r4:85174000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517438c r4:85218b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519e000 r8:85218b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218b00 r8:8027f5e8 r7:eab75e60 r6:85218b80 r5:8519e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522fac0 INFO: task kworker/0:401:4200 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 80acb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4203 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:851eec00 r4:00000000 r9:83018005 r8:851eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522ff80 INFO: task kworker/0:402:4203 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 task:kworker/1:141 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ea84b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:844bd78c r4:85207d00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:4206 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:851d5400 r4:851d5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfa6b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85174b8c r4:85207e00 Exception stack(0xeac85fb0 to 0xeac85ff8) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:4208 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:84980000 r4:84980000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r5:00001000 r4:eaabf000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:852400c0 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0545d28 to 0xe0545d70) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4213 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:84981800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaca9fb0 to 0xeaca9ff8) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4215 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:84982400 r4:84982400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84982400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84982400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0573000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175f8c r4:85175c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85175f8c r4:85218d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84982400 r8:85218dac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeacadfb0 to 0xeacadff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05a9000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:406:4217 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:4219 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:84983c00 r4:84983c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84983c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517678c r4:85176400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517678c r4:85218e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983c00 r8:85218eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85218e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218e80 r8:8027f5e8 r7:eacb1e60 r6:85232200 r5:84983c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852367c0 INFO: task kworker/0:407:4219 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:84984800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r5:00001000 r4:e067b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84984800 r8:85218f2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85218f00 r8:8027f5e8 r7:eacb5e60 r6:85232280 r5:84984800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85236900 INFO: task kworker/0:408:4221 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8519bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:00001000 r4:e8711000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85218f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:4226 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:410 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eabadd84 r8:00000002 r7:60000013 r6:eabadd8c r5:8519ec00 r4:8519ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8777000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517738c r4:85177000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517738c r4:8522d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519ec00 r8:8522d0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d080 r8:8027f5e8 r7:eacbde60 r6:8522d100 r5:8519ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85236c80 INFO: task kworker/0:410:4226 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea795000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8519b000 r8:8522d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d180 r8:8027f5e8 r7:eabade60 r6:8522d200 r5:8519b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85236d40 INFO: task kworker/0:411:4227 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:83a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:00001000 r4:ea7e9000 r5:8517c38c r4:8517c000 r4:8522d280 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea7ad000 r10:00000000 r9:8522d380 r8:8027f5e8 r7:eacc1e60 r6:8522d400 r5:83a59800 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4233 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacc9d84 r8:00000002 r7:60000013 r6:eacc9d8c r5:83a5a400 r4:83a5a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a5a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523e200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7cf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177f8c r4:85177c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85177f8c r4:8522d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a5a400 r8:8522d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d480 r8:8027f5e8 r7:eacc1e60 r6:8522d500 r5:83a5a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523e140 INFO: task kworker/0:414:4233 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:83a5b000 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523e500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a5b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea803000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517c78c r4:8517c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517c78c r4:8522d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a5b000 r8:8522d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d580 r8:8027f5e8 r7:eacc1e60 r6:8522d600 r5:83a5b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523e240 INFO: task kworker/0:415:4235 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ea951000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8517cb8c r4:8517c800 r7:dddced80 r6:83018000 r5:8517cb8c r4:8522d680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4239 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84986c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa39000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84986c00 r8:8522d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523e480 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:851f1800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa51000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeacedfb0 to 0xeacedff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4244 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf5d84 r8:00000002 r7:60000013 r6:eacf5d8c r5:851f0000 r4:851f0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523ee00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517df8c r4:8517dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517df8c r4:8522d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f0000 r8:8522d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522d880 r8:8027f5e8 r7:eacede60 r6:85232400 r5:851f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523e780 INFO: task kworker/0:419:4244 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83a5c800 r4:00000000 r9:83018005 r8:83a5c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:8517d78c r4:8517d400 r4:8522d900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 r4:83a5e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517db8c r4:8517d800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517db8c r4:8522da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a5e000 r8:8522da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522da00 r8:8027f5e8 r7:eacf5e60 r6:8522da80 r5:83a5e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523ea80 INFO: task kworker/0:421:4247 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4248 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eacf1d84 r8:00000002 r7:60000013 r6:eacf1d8c r5:83a58000 r4:00000000 r5:00001000 r4:eaadb000 r7:dddced80 r6:83018000 r5:8517f38c r4:8522db00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8523ec80 INFO: task kworker/0:422:4248 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:83a5d400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa97000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeacddfb0 to 0xeacddff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84b6e700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851a0c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaaa5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8517e78c r4:8522dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0c00 r8:8522dd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522dd00 r8:8027f5e8 r7:eacf1e60 r6:8522dd80 r5:851a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524c080 INFO: task kworker/0:424:4252 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:425:4255 blocked for more than 459 seconds. r4:851a1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:00001000 r4:eaab3000 r5:8517eb8c r4:8517e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r5:00001000 r4:eaacd000 r5:8517ef8c r4:8517ec00 r7:dddced80 r6:83018000 r5:8517ef8c r4:8522df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a2400 r8:8522df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522df00 r8:8027f5e8 r7:eacf1e60 r6:8522df80 r5:851a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead05fb0 to 0xead05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524c280 INFO: task kworker/0:426:4257 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4261 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:851a3c00 r4:851a3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524c940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8517f78c r4:85248000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:4263 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:851f0c00 r4:851f0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85027b8c r4:85027800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851f0c00 r8:852324ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85251080 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:851a4800 r4:00000000 r4:00000000 r5:00001000 r4:eab01000 r7:dddced80 r6:83018000 r5:8517fb8c r4:85248100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:4265 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:851a5400 r4:851a5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524cfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527438c r4:85274000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527438c r4:85248200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a5400 r8:8524822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85248200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248200 r8:8027f5e8 r7:ead0de60 r6:85248280 r5:851a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524c900 INFO: task kworker/0:429:4265 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:851a6000 r4:00000000 r9:83018005 r8:851a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:851f3000 r4:851f3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85251d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea825000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844bdb8c r4:844bd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844bdb8c r4:85232580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851f3000 r8:852325ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232580 r8:8027f5e8 r7:eab21e60 r6:85232600 r5:851f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85251200 INFO: task kworker/1:145:4268 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4271 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eab65000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:431:4271 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) task:kworker/0:432 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523efc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab81000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85274b8c r4:85274800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85274b8c r4:85248480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3000 r8:852484ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85248480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248480 r8:8027f5e8 r7:ead29e60 r6:85248500 r5:851a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523ef80 INFO: task kworker/0:432:4273 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4275 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead2dd84 r8:00000002 r7:60000013 r6:ead2dd8c r5:851a6c00 r4:851a6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eabb7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8527538c r4:85248580 r10:00000000 r9:85248580 r8:8027f5e8 r7:ead25e60 r6:85248600 r5:851a6c00 Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252080 INFO: task kworker/0:433:4275 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:83a5ec00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab97000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252880 r5:00001000 r4:eac4b000 r7:dddced80 r6:83018000 r5:85275b8c r4:85248780 Exception stack(0xead39fb0 to 0xead39ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead3dd84 r8:00000002 r7:60000013 r6:ead3dd8c r5:84492400 r4:84492400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84492400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84492400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527578c r4:85275400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527578c r4:85248880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84492400 r8:852488ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85248880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248880 r8:8027f5e8 r7:ead39e60 r6:85248900 r5:84492400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852525c0 INFO: task kworker/0:436:4280 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eac71000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4285 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ead11000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8527638c r4:85248a80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4287 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea995d84 r8:00000002 r7:60000013 r6:ea995d8c r5:851f6000 r4:851f6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851f6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0545d28 to 0xe0545d70) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:440:4290 blocked for more than 460 seconds. [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:dfd09000 r5:85276b8c r4:85276800 r10:61c88647 r9:851f3c00 r8:85248bac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252c80 INFO: task kworker/0:440:4290 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 815e5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r5:00001000 r4:dfddd000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4292 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ea901d84 r8:00000002 r7:60000013 r6:ea901d8c r5:84493c00 r4:84493c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:84493c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r7:dddced80 r6:83018000 r5:8527738c r4:85248d00 Exception stack(0xea901fb0 to 0xea901ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:443:4295 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:84494800 r4:84494800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84494800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84494800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff21000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527778c r4:85277400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527778c r4:85248e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84494800 r8:85248e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85248e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248e00 r8:8027f5e8 r7:ea901e60 r6:85248e80 r5:84494800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:e02bb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277f8c r4:85277c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85277f8c r4:85248f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84495400 r8:85248f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85248f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85248f00 r8:8027f5e8 r7:ead55e60 r6:85248f80 r5:84495400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d240 INFO: task kworker/0:444:4298 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:e026b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85277b8c r4:8525f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84496000 r8:8525f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f000 r8:8027f5e8 r7:ead61e60 r6:8525f080 r5:84496000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead65fb0 to 0xead65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d180 INFO: task kworker/0:445:4299 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4301 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:84493000 r4:84493000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84493000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r9:83018005 r8:84493000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:00001000 r4:e0371000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8525f100 Exception stack(0xead5dfb0 to 0xead5dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:447 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b478c r4:852b4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b478c r4:8525f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8000 r8:8525f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f200 r8:8027f5e8 r7:ead5de60 r6:8525f280 r5:851b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d5c0 INFO: task kworker/0:447:4303 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:448 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r9:83018005 r8:851b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:00001000 r4:eaa19000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b5b8c r4:852b5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b5b8c r4:8525f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b9800 r8:8525f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f300 r8:8027f5e8 r7:ead6de60 r6:8525f380 r5:851b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d780 INFO: task kworker/0:448:4305 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:449:4306 blocked for more than 460 seconds. r10:82918930 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:851ba400 r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0453000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b4b8c r4:852b4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b4b8c r4:8525f400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ba400 r8:8525f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f400 r8:8027f5e8 r7:ead71e60 r6:8525f480 r5:851ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d9c0 INFO: task kworker/0:449:4306 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 task:kworker/0:450 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r5:00001000 r4:e051f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851bbc00 r8:8525f52c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525da40 INFO: task kworker/0:450:4309 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4311 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:851b8c00 r4:851b8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa03000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b578c r4:852b5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b578c r4:8525f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b8c00 r8:8525f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f600 r8:8027f5e8 r7:ead71e60 r6:8525f680 r5:851b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525d9c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:146:4313 blocked for more than 460 seconds. r10:82918930 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:84986000 r4:00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea997000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:844e378c r4:85232880 Exception stack(0xead69fb0 to 0xead69ff8) r4:85251ec0 Workqueue: events bpf_prog_free_deferred 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84985400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:00001000 r4:ea865000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844beb8c r4:844be800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844beb8c r4:85232980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84985400 r8:852329ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232980 r8:8027f5e8 r7:ead69e60 r6:85232a00 r5:84985400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85251ec0 INFO: task kworker/1:147:4315 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:851f6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8f5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851f6c00 r8:85232aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378040 r5:00001000 r4:eaaaf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:852c378c r4:85232b80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:4321 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead91d84 r8:00000002 r7:60000113 r6:ead91d8c r5:85278000 r4:85278000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85278000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85278000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:00001000 r4:ea9e1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85232c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:4323 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:85278c00 r4:85278c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85278c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85278c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b6f8c r4:852b6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852b6f8c r4:85232d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278c00 r8:85232dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85232d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232d80 r8:8027f5e8 r7:ead8de60 r6:85232e00 r5:85278c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852581c0 INFO: task kworker/1:151:4323 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4326 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eada5d84 r8:00000002 r7:60000013 r6:eada5d8c r5:85279800 r4:85279800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85279800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaa4d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8525f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f700 r8:8027f5e8 r7:ead71e60 r6:85232e80 r5:85279800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524f2c0 INFO: task kworker/0:452:4326 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4328 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:8527bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:00001000 r4:eabcd000 r7:dddced80 r6:83018000 r5:852b638c r4:8525f780 r10:00000000 r9:8525f780 r8:8027f5e8 r7:eada5e60 r6:85232f00 r5:8527bc00 r4:8524f680 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4329 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:8527a400 r4:8527a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eabdd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b678c r4:852b6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b678c r4:8525f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527a400 r8:8525f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f800 r8:8027f5e8 r7:eadade60 r6:85232f80 r5:8527a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524f680 INFO: task kworker/0:454:4329 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8527b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7f8c r4:852b7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b7f8c r4:8525f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527b000 r8:8525f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f880 r8:8027f5e8 r7:eadb1e60 r6:85262000 r5:8527b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524f4c0 INFO: task kworker/0:455:4331 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:4333 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:4333 tgid:4333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabf9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82918930 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:8527ec00 r9:83018005 r8:8527ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r5:00001000 r4:eac49000 r7:dddced80 r6:83018000 r5:852b738c r4:8525f980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527ec00 r8:8525f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525f980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525f980 r8:8027f5e8 r7:eadb9e60 r6:85262100 r5:8527ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524fa80 INFO: task kworker/0:457:4335 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e0545dc0 r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac7d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b778c r4:852b7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b778c r4:8525fa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527d400 r8:8525fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fa00 r8:8027f5e8 r7:eadb9e60 r6:85262180 r5:8527d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4340 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadddd84 r8:00000002 r7:60000113 r6:eadddd8c r5:85280c00 r4:85280c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85280c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8524fb80 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:4341 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r5:00001000 r4:eaa37000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82918930 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:85283000 r4:00000000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85283000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae03000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bc38c r4:852bc000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bc38c r4:8525fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283000 r8:8525fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fb00 r8:8027f5e8 r7:eadb9e60 r6:85262380 r5:85283000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8524fd40 INFO: task kworker/0:460:4343 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6d780 r4:85282400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdb8c r4:852bd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bdb8c r4:8525fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85282400 r8:8525fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fb80 r8:8027f5e8 r7:eadf1e60 r6:85262400 r5:85282400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:800c0113 r4:80239bb0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:4347 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r5:00001000 r4:eae0f000 r7:dddced80 r6:83018000 r5:852bc78c r4:8525fc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:84ab1b8c r4:84ab1800 5fa0: 00000000 00000000 00000000 00000000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eae1f000 r10:61c88647 r9:85285400 r8:8525fcac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526c2c0 INFO: task kworker/0:463:4349 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:85286000 r4:85286000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85286000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eae2f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8526c240 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4354 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:85283c00 r4:85283c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bd38c r4:852bd000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bd38c r4:8525fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283c00 r8:8525fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fd80 r8:8027f5e8 r7:eae01e60 r6:85262600 r5:85283c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526c480 INFO: task kworker/0:465:4354 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:466 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85284800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bd78c r4:852bd400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bd78c r4:8525fe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85284800 r8:8525fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fe00 r8:8027f5e8 r7:eae01e60 r6:85262680 r5:85284800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526c4c0 INFO: task kworker/0:466:4356 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:e0545dc0 r5:00001000 r4:e038d000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:467 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:eae5dd84 r8:00000002 r7:60000113 r6:eae5dd8c r5:85286c00 r4:85286c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85286c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526cac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852be38c r4:852be000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852be38c r4:8525fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85286c00 r8:8525feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525fe80 r8:8027f5e8 r7:eae01e60 r6:85262700 r5:85286c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526c4c0 INFO: task kworker/0:467:4357 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:468 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r9:83018005 r8:8527e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 r5:00001000 r4:eae67000 r7:dddced80 r6:83018000 r5:852bdf8c r4:8525ff00 Exception stack(0xeae71fb0 to 0xeae71ff8) Workqueue: events bpf_prog_free_deferred [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eae7f000 r5:852be78c r4:852be400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4364 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:85289800 r4:85289800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85289800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526cf00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85289800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bef8c r4:852bec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bef8c r4:85360000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85289800 r8:8536002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360000 r8:8027f5e8 r7:eae7de60 r6:85262880 r5:85289800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526ca80 INFO: task kworker/0:470:4364 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4365 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae99d84 r8:00000002 r7:60000013 r6:eae99d8c r5:8528a400 r4:8528a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526cd40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852beb8c r4:852be800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852beb8c r4:85360080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528a400 r8:853600ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360080 r8:8027f5e8 r7:eae95e60 r6:85262900 r5:8528a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae99fb0 to 0xeae99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8526ca80 INFO: task kworker/0:471:4365 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4369 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eace5d84 r8:00000002 r7:60000013 r6:eace5d8c r5:8528bc00 r4:8528bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367740 r4:00000000 r9:83018005 r8:8528bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:00001000 r4:ea787000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:473 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:474 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fba00 r5:00001000 r4:dfb91000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bf78c r4:85360200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528b000 r8:8536022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360200 r8:8027f5e8 r7:eace5e60 r6:85262a80 r5:8528b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea5fb0 to 0xeaea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbc40 INFO: task kworker/0:474:4372 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4374 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4374 tgid:4374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:8528d400 r4:8528d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:852bfb8c r4:85360280 Exception stack(0xeaeadfb0 to 0xeaeadff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaeb5d84 r8:00000002 r7:60000113 r6:eaeb5d8c r5:8528e000 r4:8528e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8526c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528e000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bff8c r4:852bfc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bff8c r4:85360300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528e000 r8:8536032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360300 r8:8027f5e8 r7:eace5e60 r6:85262b80 r5:8528e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85258a80 INFO: task kworker/0:476:4376 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85290000 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367040 r5:00001000 r4:e0575000 r7:dddced80 r6:83018000 r5:852c038c r4:85360380 r10:00000000 r9:85360380 r8:8027f5e8 r7:eace5e60 r6:85262c00 r5:85290000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e05df000 r5:852c078c r4:852c0400 r10:61c88647 r9:85291800 r8:8536042c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4383 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:85290c00 r4:85290c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85290c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c0b8c r4:852c0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c0b8c r4:85360480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290c00 r8:853604ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360480 r8:8027f5e8 r7:eace5e60 r6:85262d00 r5:85290c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367280 INFO: task kworker/0:479:4383 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 r4:85293000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:852c0f8c r4:852c0c00 r7:dddced80 r6:83018000 r5:852c0f8c r4:85360500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293000 r8:8536052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360500 r8:8027f5e8 r7:eace5e60 r6:85262d80 r5:85293000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367500 INFO: task kworker/0:480:4385 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0545fb0 to 0xe0545ff8) task:kworker/0:481 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367880 r5:00001000 r4:ea7ab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c178c r4:852c1400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c178c r4:85360580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293c00 r8:853605ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360580 r8:8027f5e8 r7:eace5e60 r6:85262e00 r5:85293c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367440 INFO: task kworker/0:481:4387 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85294800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7d3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c1b8c r4:852c1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c1b8c r4:85360600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85294800 r8:8536062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360600 r8:8027f5e8 r7:eaed5e60 r6:85262e80 r5:85294800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed9fb0 to 0xeaed9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367180 INFO: task kworker/0:482:4389 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4391 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaee1d84 r8:00000002 r7:60000013 r6:eaee1d8c r5:85296000 r4:85296000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85296000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85296000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa69000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c2b8c r4:852c2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c2b8c r4:85360680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296000 r8:853606ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360680 r8:8027f5e8 r7:eaed9e60 r6:85262f00 r5:85296000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367900 INFO: task kworker/0:483:4391 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4392 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4392 tgid:4392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:85296c00 r4:85296c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85296c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367a00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85296c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c1f8c r4:852c1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c1f8c r4:85360700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296c00 r8:8536072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360700 r8:8027f5e8 r7:eaee1e60 r6:85262f80 r5:85296c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367900 INFO: task kworker/0:484:4392 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4394 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:85295400 r4:85295400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85295400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85295400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea941000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c238c r4:852c2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c238c r4:85360780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85295400 r8:853607ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367800 INFO: task kworker/0:485:4394 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4396 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:8528ec00 r4:8528ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa53000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c278c r4:852c2400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c278c r4:85360800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528ec00 r8:8536082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360800 r8:8027f5e8 r7:eaee1e60 r6:85377080 r5:8528ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367a80 INFO: task kworker/0:486:4396 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:4399 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaefdd84 r8:00000002 r7:60000113 r6:eaefdd8c r5:85298000 r4:85298000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85298000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85361d40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85298000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c338c r4:852c3000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c338c r4:85360880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85298000 r8:853608ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360880 r8:8027f5e8 r7:eaee1e60 r6:85377100 r5:85298000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367c00 INFO: task kworker/0:487:4399 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4401 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae89d84 r8:00000002 r7:60000013 r6:eae89d8c r5:851bc800 r4:851bc800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bc800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa85000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c2f8c r4:852c2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c2f8c r4:85360900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bc800 r8:8536092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360900 r8:8027f5e8 r7:eaefde60 r6:85360980 r5:851bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae89fb0 to 0xeae89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85367cc0 INFO: task kworker/0:488:4401 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81aca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4404 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf01d84 r8:00000002 r7:60000013 r6:eaf01d8c r5:851bec00 r4:851bec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c3f8c r4:852c3c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c3f8c r4:85360a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bec00 r8:85360a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360a00 r8:8027f5e8 r7:eaefde60 r6:85360a80 r5:851bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85378080 INFO: task kworker/0:489:4404 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:4405 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:851bd400 r4:851bd400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bd400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c3b8c r4:852c3800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c3b8c r4:85360b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bd400 r8:85360b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360b00 r8:8027f5e8 r7:eaf01e60 r6:85360b80 r5:851bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead9dfb0 to 0xead9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85378000 INFO: task kworker/0:490:4405 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:4406 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:85299800 r4:85299800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85299800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853750c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85299800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533938c r4:85339000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533938c r4:85377180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85299800 r8:853771ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377180 r8:8027f5e8 r7:ead8de60 r6:85377200 r5:85299800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85375640 INFO: task kworker/1:153:4406 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:4408 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf11d84 r8:00000002 r7:60000113 r6:eaf11d8c r5:8529a400 r4:8529a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533878c r4:85338400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533878c r4:85377280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529a400 r8:853772ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377280 r8:8027f5e8 r7:eaf09e60 r6:85377300 r5:8529a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85375640 INFO: task kworker/1:154:4408 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:4411 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:8529b000 r4:8529b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85338f8c r4:85338c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85338f8c r4:85377380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529b000 r8:853773ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377380 r8:8027f5e8 r7:eaf09e60 r6:85377400 r5:8529b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85375900 INFO: task kworker/1:155:4411 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:4413 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf19d84 r8:00000002 r7:60000013 r6:eaf19d8c r5:8529bc00 r4:8529bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853787c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c838c r4:852c8000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c838c r4:85360c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529bc00 r8:85360c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360c00 r8:8027f5e8 r7:eaf01e60 r6:85377480 r5:8529bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85378380 INFO: task kworker/0:491:4413 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4415 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf1dd84 r8:00000002 r7:60000013 r6:eaf1dd8c r5:8529c800 r4:8529c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85360c80 r10:00000000 r9:85360c80 r8:8027f5e8 r7:eaf19e60 r6:85377500 r5:8529c800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853785c0 INFO: task kworker/0:492:4415 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:4417 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf21d84 r8:00000002 r7:60000113 r6:eaf21d8c r5:8529d400 r4:8529d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8f8c r4:852c8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c8f8c r4:85360d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529d400 r8:85360d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360d00 r8:8027f5e8 r7:eaf1de60 r6:85377580 r5:8529d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85378580 INFO: task kworker/0:493:4417 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4419 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf25d84 r8:00000002 r7:60000013 r6:eaf25d8c r5:8529e000 r4:8529e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c8b8c r4:852c8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c8b8c r4:85360d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529e000 r8:85360dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360d80 r8:8027f5e8 r7:eaf21e60 r6:85377600 r5:8529e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 r4:8529ec00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0545dc0 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4423 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf15d84 r8:00000002 r7:60000013 r6:eaf15d8c r5:851be000 r4:851be000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851be000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c978c r4:852c9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c978c r4:85360e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:85360eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85360e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85360e80 r8:8027f5e8 r7:eaf29e60 r6:85360f00 r5:851be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85378380 INFO: task kworker/0:496:4423 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:497 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375fc0 r5:00001000 r4:eabb9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85360f80 r8:8027f5e8 r7:eaf15e60 r6:85379000 r5:84496c00 r4:85378c00 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4427 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:843e8000 r4:843e8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853715c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c9f8c r4:852c9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852c9f8c r4:85379080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e8000 r8:853790ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85379080 r8:8027f5e8 r7:eaf31e60 r6:85379100 r5:843e8000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/1:156 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae47000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85339b8c r4:85339800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85339b8c r4:85377700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ea400 r8:8537772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377700 r8:8027f5e8 r7:eaf09e60 r6:85379180 r5:843ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85375e40 INFO: task kworker/1:156:4429 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fbc80 r5:00001000 r4:dfa57000 r5:8533978c r4:85339400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:499:4432 blocked for more than 461 seconds. r10:82918930 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:843eb000 r4:00000000 r4:00000000 r5:00001000 r4:dfd5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371140 INFO: task kworker/0:499:4432 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4436 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:843e9800 r4:843e9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843e9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca38c r4:852ca000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ca38c r4:85379380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843e9800 r8:853793ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379380 r8:8027f5e8 r7:eaf35e60 r6:85379400 r5:843e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead4dfb0 to 0xead4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371440 INFO: task kworker/0:500:4436 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4438 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:843ec800 r4:843ec800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843ec800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853718c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0287000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ca78c r4:852ca400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ca78c r4:85379480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ec800 r8:853794ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379480 r8:8027f5e8 r7:ead4de60 r6:85379500 r5:843ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf39fb0 to 0xeaf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371540 INFO: task kworker/0:501:4438 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4440 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:843ed400 r4:843ed400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843ed400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03d3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852caf8c r4:852cac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852caf8c r4:85379580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ed400 r8:853795ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379580 r8:8027f5e8 r7:eaf39e60 r6:85379600 r5:843ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853716c0 INFO: task kworker/0:502:4440 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4442 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:843ee000 r4:843ee000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843ee000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0333000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cab8c r4:852ca800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cab8c r4:85379680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ee000 r8:853796ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379680 r8:8027f5e8 r7:eadd5e60 r6:85379700 r5:843ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371980 INFO: task kworker/0:503:4442 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4444 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:843eec00 r4:843eec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843eec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371d40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0465000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cb38c r4:852cb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cb38c r4:85379780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843eec00 r8:853797ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379780 r8:8027f5e8 r7:eadd5e60 r6:85379800 r5:843eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade9fb0 to 0xeade9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371a80 INFO: task kworker/0:504:4444 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4446 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadedd84 r8:00000002 r7:60000013 r6:eadedd8c r5:843ebc00 r4:843ebc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843ebc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46a7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cb78c r4:852cb400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cb78c r4:85379880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ebc00 r8:853798ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379880 r8:8027f5e8 r7:eade9e60 r6:85379900 r5:843ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadedfb0 to 0xeadedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371bc0 INFO: task kworker/0:505:4446 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:82ac11e4 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:506:4448 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eadf9d84 r8:00000002 r7:60000113 r6:eadf9d8c r5:851bb000 r4:851bb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85371040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea819000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cbb8c r4:852cb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cbb8c r4:85379980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bb000 r8:853799ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379980 r8:8027f5e8 r7:eadede60 r6:85379a00 r5:851bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf9fb0 to 0xeadf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371cc0 INFO: task kworker/0:506:4448 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:851a0000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fbe40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea853000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852cbf8c r4:852cbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852cbf8c r4:85379a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:85379aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379a80 r8:8027f5e8 r7:eadf9e60 r6:85379b00 r5:851a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85371e40 INFO: task kworker/0:507:4450 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:508 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:eae0dd84 r8:00000002 r7:60000013 r6:eae0dd8c r5:84050000 r4:84050000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84050000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84050000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea989000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d078c r4:852d0400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d078c r4:85379b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84050000 r8:85379bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379b80 r8:8027f5e8 r7:eae09e60 r6:85379c00 r5:84050000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538d080 INFO: task kworker/0:508:4453 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4454 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:84050c00 r4:84050c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84050c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84050c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8e7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d038c r4:852d0000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d038c r4:85379c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84050c00 r8:85379cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379c80 r8:8027f5e8 r7:eae0de60 r6:85379d00 r5:84050c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538d240 INFO: task kworker/0:509:4454 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4455 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf2dd84 r8:00000002 r7:60000113 r6:eaf2dd8c r5:84051800 r4:84051800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84051800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf2de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84051800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d0b8c r4:85379d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84051800 r8:85379dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379d80 r8:8027f5e8 r7:eae0de60 r6:85379e00 r5:84051800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf2dfb0 to 0xeaf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538d240 INFO: task kworker/0:510:4455 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4459 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4459 tgid:4459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:84052400 r4:84052400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84052400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84052400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0f8c r4:852d0c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d0f8c r4:85379e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84052400 r8:85379eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85379e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85379e80 r8:8027f5e8 r7:eaf2de60 r6:85379f00 r5:84052400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:84053000 r4:00000000 r4:00000000 r5:00001000 r4:eaa4b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeae2dfb0 to 0xeae2dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4462 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:84053c00 r4:84053c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84053c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538d940 r5:00001000 r4:eabd3000 r5:852d178c r4:852d1400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8538d680 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r9:83018005 r8:84054800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8538d7c0 Call trace: 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4466 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae45d84 r8:00000002 r7:60000013 r6:eae45d8c r5:84055400 r4:84055400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84055400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84055400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1f8c r4:852d1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d1f8c r4:85394300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84055400 r8:8539432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394300 r8:8027f5e8 r7:eae3de60 r6:85394380 r5:84055400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:516:4468 blocked for more than 461 seconds. r4:84056000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538de00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84056000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d238c r4:85394280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84056000 r8:853942ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394280 r8:8027f5e8 r7:eae45e60 r6:85394400 r5:84056000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538da80 INFO: task kworker/0:516:4468 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:84056c00 r4:00000000 r4:00000000 r5:00001000 r4:eada1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85394480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:85288c00 r4:85288c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85288c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85375100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85288c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead51000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d278c r4:852d2400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d278c r4:85394580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85288c00 r8:853945ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394580 r8:8027f5e8 r7:eae65e60 r6:85394600 r5:85288c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8538dc80 INFO: task kworker/0:518:4471 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0545dc0 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:519 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 r5:00001000 r4:eadb5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:852d2f8c r4:85394680 Exception stack(0xeae6dfb0 to 0xeae6dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:520 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85394780 Exception stack(0xeae85fb0 to 0xeae85ff8) INFO: task kworker/0:520:4476 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 r5:800c0113 r4:80239bb0 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4478 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf49d84 r8:00000002 r7:60000013 r6:eaf49d8c r5:85302400 r4:85302400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85302400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a02c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85302400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d378c r4:852d3400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d378c r4:85394880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85302400 r8:853948ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394880 r8:8027f5e8 r7:eae85e60 r6:85394900 r5:85302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a02c0 INFO: task kworker/0:521:4478 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 81e63000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0545dc0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eaf4dd84 r8:00000002 r7:60000013 r6:eaf4dd8c r5:85303c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf5b000 r5:852d3f8c r4:852d3c00 r10:61c88647 r9:85303c00 r8:853949ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800c0113 r4:80239bb0 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:85304800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r5:00001000 r4:eae11000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:852d3b8c r4:85394a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85304800 r8:85394aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394a80 r8:8027f5e8 r7:eaf4de60 r6:85394b00 r5:85304800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a05c0 INFO: task kworker/0:523:4482 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 85cca000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:4484 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:85298c00 r4:85298c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85298c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85339f8c r4:85339c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85339f8c r4:85377800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85298c00 r8:8537782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377800 r8:8027f5e8 r7:dfa85e60 r6:85377880 r5:85298c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85385d40 INFO: task kworker/1:158:4484 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 85f3d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 r5:85292400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a8040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85292400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf97000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533a38c r4:8533a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533a38c r4:85377900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85292400 r8:8537792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85377900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377900 r8:8027f5e8 r7:dfa85e60 r6:85377980 r5:85292400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85385f40 INFO: task kworker/1:159:4487 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 85f3d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaf63000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852dc38c r4:852dc000 r4:85394b80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:4490 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf71d84 r8:00000002 r7:60000013 r6:eaf71d8c r5:852a0c00 r4:852a0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538dfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dcf8c r4:852dcc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dcf8c r4:85394c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0c00 r8:85394c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394c00 r8:8027f5e8 r7:eaf6de60 r6:85377a80 r5:852a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf71fb0 to 0xeaf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853a0a40 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf73000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4493 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:852a2400 r4:852a2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a0900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dcb8c r4:852dc800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dcb8c r4:85394d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a2400 r8:85394d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394d00 r8:8027f5e8 r7:eaf71e60 r6:85377b80 r5:852a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a0b00 INFO: task kworker/0:527:4493 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 867fb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:528 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r5:00001000 r4:eafa3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85303000 r8:85394dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:e0545dc0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4499 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaf59d84 r8:00000002 r7:60000113 r6:eaf59d8c r5:852a3000 r4:852a3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a28c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852de78c r4:852de400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852de78c r4:85394e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3000 r8:85394eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394e80 r8:8027f5e8 r7:eaf95e60 r6:85377c00 r5:852a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eafab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:852a3c00 r8:85394f2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:82ac11e4 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4503 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:852a5400 r4:852a5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ddb8c r4:852dd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ddb8c r4:85394f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a5400 r8:85394fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85394f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85394f80 r8:8027f5e8 r7:eaf59e60 r6:85377d00 r5:852a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a22c0 INFO: task kworker/0:531:4503 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:852a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r5:852ddf8c r4:852ddc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ddf8c r4:853a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6000 r8:853a102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1000 r8:8027f5e8 r7:eaf59e60 r6:85377d80 r5:852a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2300 INFO: task kworker/0:532:4505 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 87466000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4508 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:852a6c00 r4:852a6c00 r5:852a6c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 r5:00001000 r4:eafd1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852de38c r4:852de000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852a6c00 r8:853a10ac r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:4509 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:852a4800 r4:852a4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a29c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852deb8c r4:852de800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852deb8c r4:853a1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a4800 r8:853a112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1100 r8:8027f5e8 r7:eaf59e60 r6:85377e80 r5:852a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff1fb0 to 0xeaff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2540 INFO: task kworker/0:534:4509 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 878b9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4511 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:852a8c00 r4:852a8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaffb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852def8c r4:852dec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852def8c r4:853a1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a8c00 r8:853a11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1180 r8:8027f5e8 r7:eaff1e60 r6:85377f00 r5:852a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2400 INFO: task kworker/0:535:4511 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 87ace000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4512 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:852a9800 r4:852a9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb017000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df38c r4:852df000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852df38c r4:853a1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a9800 r8:853a122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1200 r8:8027f5e8 r7:eb005e60 r6:85377f80 r5:852a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2400 INFO: task kworker/0:536:4512 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 87ace000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r4:82ac11e4 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:160:4514 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:852a8000 r4:852a8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d10c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead97000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533ab8c r4:8533a800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533ab8c r4:853ae000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a8000 r8:853ae02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ae000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae000 r8:8027f5e8 r7:dfa85e60 r6:853ae080 r5:852a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a8640 INFO: task kworker/1:160:4514 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 87e34000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4515 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb015d84 r8:00000002 r7:60000013 r6:eb015d8c r5:852ab000 r4:852ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2f00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dfb8c r4:852df800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dfb8c r4:853a1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ab000 r8:853a12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1280 r8:8027f5e8 r7:eb009e60 r6:853ae100 r5:852ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2840 INFO: task kworker/0:537:4515 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 87e34000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:852abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df78c r4:852df400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852df78c r4:853a1300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852abc00 r8:853a132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1300 r8:8027f5e8 r7:eb015e60 r6:853ae180 r5:852abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2b40 INFO: task kworker/0:538:4516 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8814e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4520 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:85305400 r4:85305400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85305400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dff8c r4:852dfc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dff8c r4:853a1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85305400 r8:853a13ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1380 r8:8027f5e8 r7:eb015e60 r6:853a1400 r5:85305400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853a2e80 INFO: task kworker/0:539:4520 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 88474000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 Call trace: r4:85300c00 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e052f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85300c00 r8:853a14ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 88474000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:4523 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:85306c00 r4:85306c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfee3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e038c r4:852e0000 r7:dddced80 r6:83018000 r5:852e038c r4:853a1580 r10:61c88647 r9:85306c00 r8:853a15ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeafc1fb0 to 0xeafc1ff8) r4:853b1080 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4526 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:85306000 r4:85306000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b16c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0615000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e0f8c r4:852e0c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e0f8c r4:853a1680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306000 r8:853a16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1680 r8:8027f5e8 r7:eb02de60 r6:853a1700 r5:85306000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b13c0 INFO: task kworker/0:542:4526 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 886ef000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4528 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:84150000 r4:84150000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84150000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84150000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e0b8c r4:852e0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e0b8c r4:853a1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150000 r8:853a17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1780 r8:8027f5e8 r7:eb031e60 r6:853a1800 r5:84150000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b13c0 INFO: task kworker/0:543:4528 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 88ab7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:544:4531 blocked for more than 462 seconds. r4:84150c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b17c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84150c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8725000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e138c r4:852e1000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e138c r4:853a1880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150c00 r8:853a18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1880 r8:8027f5e8 r7:eb031e60 r6:853a1900 r5:84150c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1540 INFO: task kworker/0:544:4531 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 88ab7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4532 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb03dd84 r8:00000002 r7:60000013 r6:eb03dd8c r5:84151800 r4:84151800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84151800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r4:00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea797000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84151800 r8:853a19ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b15c0 INFO: task kworker/0:545:4532 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 88d82000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4534 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:84152400 r4:84152400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84152400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84152400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7c5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e1b8c r4:852e1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e1b8c r4:853a1a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84152400 r8:853a1aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1a80 r8:8027f5e8 r7:eb03de60 r6:853a1b00 r5:84152400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1840 INFO: task kworker/0:546:4534 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4536 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb045d84 r8:00000002 r7:60000013 r6:eb045d8c r5:84153000 r4:84153000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84153000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1c80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84153000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e1f8c r4:852e1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e1f8c r4:853a1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84153000 r8:853a1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1b80 r8:8027f5e8 r7:eb041e60 r6:853a1c00 r5:84153000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:547:4536 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 INFO: task kworker/0:548:4538 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb049d84 r8:00000002 r7:60000013 r6:eb049d8c r5:84153c00 r4:84153c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84153c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a2e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84153c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e278c r4:852e2400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e278c r4:853a1c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84153c00 r8:853a1cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1c80 r8:8027f5e8 r7:eb045e60 r6:853a1d00 r5:84153c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1b00 INFO: task kworker/0:548:4538 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 894fd000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4539 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:84154800 r4:84154800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84154800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84154800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa29000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e238c r4:852e2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e238c r4:853a1d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84154800 r8:853a1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1d80 r8:8027f5e8 r7:eb049e60 r6:853a1e00 r5:84154800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1cc0 INFO: task kworker/0:549:4539 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4542 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:84155400 r4:84155400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84155400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b1fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84155400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e2b8c r4:852e2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e2b8c r4:853a1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84155400 r8:853a1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1e80 r8:8027f5e8 r7:eb049e60 r6:853a1f00 r5:84155400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853b1cc0 INFO: task kworker/0:550:4542 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 89a46000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4544 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:84156000 r4:84156000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84156000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84156000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e338c r4:852e3000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e338c r4:853a1f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84156000 r8:853a1fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853a1f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a1f80 r8:8027f5e8 r7:eb04de60 r6:853c6000 r5:84156000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8040 INFO: task kworker/0:551:4544 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 89e27000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4545 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:84156c00 r4:84156c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84156c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e2f8c r4:852e2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e2f8c r4:853c6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84156c00 r8:853c60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6080 r8:8027f5e8 r7:eb069e60 r6:853c6100 r5:84156c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8040 INFO: task kworker/0:552:4545 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 89e27000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaac1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:553:4548 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85309800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e3b8c r4:852e3800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852e3b8c r4:853c6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:853c62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6280 r8:8027f5e8 r7:eb065e60 r6:853c6300 r5:85309800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8340 INFO: task kworker/0:554:4550 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8a419000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4553 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8530b000 r4:8530b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb085e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8bc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e438c r4:853e4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e438c r4:853c6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:8530a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r9:83018005 r8:8530a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:852e3f8c r4:852e3c00 r4:853c6480 Exception stack(0xeb089fb0 to 0xeb089ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:8530c800 r4:8530c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530c800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e478c r4:853e4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e478c r4:853c6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530c800 r8:853c65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6580 r8:8027f5e8 r7:eb085e60 r6:853c6600 r5:8530c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c89c0 INFO: task kworker/0:557:4557 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8ab2e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:8530d400 r4:00000000 r4:00000000 r5:00001000 r4:eac01000 r7:dddced80 r6:83018000 r5:853e4f8c r4:853c6680 Exception stack(0xeb091fb0 to 0xeb091ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:559:4560 blocked for more than 462 seconds. r4:85308000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c8f00 INFO: task kworker/0:559:4560 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8aea9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4563 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb079d84 r8:00000002 r7:60000013 r6:eb079d8c r5:8530e000 r4:8530e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e538c r4:853e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e538c r4:853c6880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530e000 r8:853c68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6880 r8:8027f5e8 r7:eb091e60 r6:853c6900 r5:8530e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb0c0 INFO: task kworker/0:560:4563 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b0bb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4565 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4565 tgid:4565 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:84940000 r4:84940000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84940000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84940000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e578c r4:853e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e578c r4:853c6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84940000 r8:853c69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6980 r8:8027f5e8 r7:eb079e60 r6:853c6a00 r5:84940000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb180 INFO: task kworker/0:561:4565 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b0bb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:4567 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:84941800 r4:84941800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84941800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84941800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e5b8c r4:853e5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e5b8c r4:853c6a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84941800 r8:853c6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6a80 r8:8027f5e8 r7:eb0b5e60 r6:853c6b00 r5:84941800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb040 INFO: task kworker/0:562:4567 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b0bb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:4570 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb071d84 r8:00000002 r7:60000013 r6:eb071d8c r5:852ad400 r4:852ad400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ad400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cba40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e5f8c r4:853e5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e5f8c r4:853c6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ad400 r8:853c6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6b80 r8:8027f5e8 r7:eb0bde60 r6:853ae200 r5:852ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb500 INFO: task kworker/0:563:4570 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b3e0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:564:4572 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0b1d84 r8:00000002 r7:60000013 r6:eb0b1d8c r5:852ae000 r4:852ae000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ae000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cbe80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e6b8c r4:853e6800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e6b8c r4:853c6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ae000 r8:853c6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6c00 r8:8027f5e8 r7:eb071e60 r6:853ae280 r5:852ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb980 INFO: task kworker/0:564:4572 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b3e0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:4573 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:852aec00 r4:852aec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852aec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cbb80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e638c r4:853e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e638c r4:853c6c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aec00 r8:853c6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6c80 r8:8027f5e8 r7:eb0b1e60 r6:853ae300 r5:852aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cb980 INFO: task kworker/0:565:4573 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8b834000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4575 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:852ac800 r4:852ac800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ac800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d13c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533af8c r4:8533ac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533af8c r4:853ae380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ac800 r8:853ae3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ae380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae380 r8:8027f5e8 r7:dfa85e60 r6:853ae400 r5:852ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1300 INFO: task kworker/1:161:4575 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8bc6c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:4577 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:852aa400 r4:852aa400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852aa400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d17c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533b38c r4:8533b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533b38c r4:853ae480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aa400 r8:853ae4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ae480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae480 r8:8027f5e8 r7:dfa85e60 r6:853ae500 r5:852aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1240 INFO: task kworker/1:162:4577 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8bc6c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4579 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:848d8000 r4:848d8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848d8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e678c r4:853e6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e678c r4:853c6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d8000 r8:853c6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6d00 r8:8027f5e8 r7:eb0b1e60 r6:853ae580 r5:848d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cbc40 INFO: task kworker/0:566:4579 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8c063000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4581 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4581 tgid:4581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:848d8c00 r4:848d8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848d8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cb980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e6f8c r4:853e6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e6f8c r4:853c6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d8c00 r8:853c6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6d80 r8:8027f5e8 r7:eb0b1e60 r6:853ae600 r5:848d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cbb40 INFO: task kworker/0:567:4581 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8c477000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:4583 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:84943000 r4:84943000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84943000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84943000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533b78c r4:8533b400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533b78c r4:853c6e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84943000 r8:853c6e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6e00 r8:8027f5e8 r7:eb0d5e60 r6:853c6e80 r5:84943000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853cbe00 INFO: task kworker/0:568:4583 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8c477000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:4586 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:84942400 r4:84942400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84942400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84942400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb123000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533bb8c r4:8533b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8533bb8c r4:853ae680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84942400 r8:853ae6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ae680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ae680 r8:8027f5e8 r7:dfa85e60 r6:853c6f00 r5:84942400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1640 INFO: task kworker/1:163:4586 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8c8e4000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4587 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0fdd84 r8:00000002 r7:60000013 r6:eb0fdd8c r5:84944800 r4:84944800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84944800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba5c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84944800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e778c r4:853e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e778c r4:853c6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84944800 r8:853c6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c6f80 r8:8027f5e8 r7:eb0e1e60 r6:853c1000 r5:84944800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba040 INFO: task kworker/0:569:4587 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8c8e4000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4589 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb109d84 r8:00000002 r7:60000013 r6:eb109d8c r5:84945400 r4:84945400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84945400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84945400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e738c r4:853e7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e738c r4:853c1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84945400 r8:853c10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1080 r8:8027f5e8 r7:eb0fde60 r6:853c1100 r5:84945400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba1c0 INFO: task kworker/0:570:4589 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8cb69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb117000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e7b8c r4:853e7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e7b8c r4:853c1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84946000 r8:853c11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1180 r8:8027f5e8 r7:eb0fde60 r6:853c1200 r5:84946000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba440 INFO: task kworker/0:571:4591 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84946c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e7f8c r4:853e7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853e7f8c r4:853c1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84946c00 r8:853c12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1280 r8:8027f5e8 r7:eb115e60 r6:853c1300 r5:84946c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853ba640 INFO: task kworker/0:572:4593 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8ceda000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:848d9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848d9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ac040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535878c r4:85358400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848d9800 r8:853ae72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:4596 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:165 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:848da400 r4:848da400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848da400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d1e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e4b8c r4:844e4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848da400 r8:853ae82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8d428000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84b6d780 r10:82918930 r9:eb13dd84 r8:00000002 r7:60000013 r6:eb13dd8c r5:848db000 r9:83018005 r8:848db000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f038c r4:853f0000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f038c r4:853c1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848db000 r8:853c13ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1380 r8:8027f5e8 r7:eb121e60 r6:853ae900 r5:848db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:84b6e700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ffb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04eb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:574 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb163000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853baa80 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eb1a7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f178c r4:853f1400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f178c r4:853c1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848dbc00 r8:853c14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1480 r8:8027f5e8 r7:eb171e60 r6:853aeb00 r5:848dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853bac40 INFO: task kworker/0:575:4605 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8ddd0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82918930 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:84a30000 r5:00001000 r4:eb173000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ba880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a31800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f0f8c r4:853f0c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f0f8c r4:853c1580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a31800 r8:853c15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1580 r8:8027f5e8 r7:eb17de60 r6:853aec00 r5:84a31800 Exception stack(0xeb195fb0 to 0xeb195ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cbcc0 r10:00000000 r9:853c1600 r8:8027f5e8 r7:eb17de60 r6:853aec80 r5:84a32400 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0040 r4:853c1680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853d1f40 INFO: task kworker/0:579:4613 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8e40c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84a33c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a33c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:dfd95000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84a35400 r8:853c17ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 r5:00001000 r4:eb1d7000 r4:853c1800 INFO: task kworker/0:582:4619 is blocked on a mutex likely owned by task kworker/1:97:3681. [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Not tainted 6.15.0-syzkaller #0 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:61c88647 r9:84940c00 r8:853c18ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0545d28 to 0xe0545d70) r5:00001000 r4:e038d000 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84943c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84943c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c0700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84943c00 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f2b8c r4:853f2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f2b8c r4:853c1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 INFO: task kworker/0:585:4625 blocked for more than 463 seconds. [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:8530ec00 r8:853c1aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r5:00001000 r4:dfe83000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f338c r4:853f3000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f338c r4:853c1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530bc00 r8:853c1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853c1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1b80 r8:8027f5e8 r7:eaf69e60 r6:853c1c00 r5:8530bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c0800 INFO: task kworker/0:586:4627 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8f7ad000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000001 task:kworker/0:587 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e036f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:853c09c0 INFO: task kworker/0:587:4629 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8f9aa000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:588:4631 is blocked on a mutex likely owned by task kworker/1:97:3681. r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4633 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r5:00001000 r4:e041f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:853f3f8c r4:853c1e80 r4:853c1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853c1e80 r8:8027f5e8 r7:eaf91e60 r6:853c1f00 r5:85311800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c0c00 INFO: task kworker/0:589:4633 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 8ff13000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6d780 r4:84a30c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c8b00 r5:00001000 r4:ea827000 r4:853c1f80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:4637 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:84a33000 r4:84a33000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a33000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916b00 r9:83018005 r8:84a33000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a33000 r8:8451202c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb001fb0 to 0xeb001ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 90952000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:848dec00 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea863000 r10:61c88647 r9:848dec00 r8:845120ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 90952000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:593 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916300 r5:00001000 r4:ea905000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f4f8c r4:853f4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f4f8c r4:84512100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36000 r8:8451212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512100 r8:8027f5e8 r7:eb001e60 r6:84137080 r5:84a36000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916080 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b6e700 r4:84b6d780 r4:85418c00 r4:00000000 r5:00001000 r4:ea9f1000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:594:4642 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb209d84 r8:00000002 r7:60000113 r6:eb209d8c r5:85418000 r4:85418000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85418000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85418000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa3f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853f578c r4:853f5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f578c r4:84512200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85418000 r8:8451222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512200 r8:8027f5e8 r7:eb001e60 r6:84137180 r5:85418000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r5:00001000 r4:eabcb000 r7:dddced80 r6:83018000 r5:853f5b8c r4:84512280 INFO: task kworker/0:596:4646 is blocked on a mutex likely owned by task kworker/1:97:3681. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:4649 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb219d84 r8:00000002 r7:60000013 r6:eb219d8c r5:8541c800 r4:8541c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541c800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f5f8c r4:853f5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f5f8c r4:84512300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541c800 r8:8451232c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb219fb0 to 0xeb219ff8) Exception stack(0xe0545d28 to 0xe0545d70) r5:00001000 r4:e038d000 r4:84b6e700 r4:84b6d780 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916940 r5:853f638c r4:853f6000 r4:84512380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512380 r8:8027f5e8 r7:eb001e60 r6:84137300 r5:8541a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916600 INFO: task kworker/0:598:4650 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:599 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:85312400 r4:85312400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85312400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ff400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85312400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84512400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:4656 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:85313c00 r4:85313c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85313c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f6b8c r4:853f6800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f6b8c r4:84512500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313c00 r8:8451252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512500 r8:8027f5e8 r7:eb215e60 r6:84512580 r5:85313c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916840 INFO: task kworker/0:600:4656 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f6f8c r4:853f6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f6f8c r4:84512600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313000 r8:8451262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512600 r8:8027f5e8 r7:eb221e60 r6:84512680 r5:85313000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916840 INFO: task kworker/0:601:4657 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 91936000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000001 r4:84b6d780 r10:82918930 r9:eb155d84 r8:00000002 r7:60000013 r6:eb155d8c r5:85315400 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bf7c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85315400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f778c r4:853f7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f778c r4:84512700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85316000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r5:00001000 r4:eae41000 r10:61c88647 r9:85316000 r8:8451282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:4665 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:85314800 r4:85314800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaf5f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84512a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512a00 r8:8027f5e8 r7:eb22de60 r6:84512a80 r5:85314800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f9080 INFO: task kworker/0:605:4665 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf81000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f7f8c r4:853f7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f7f8c r4:84512b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848de000 r8:84512b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512b00 r8:8027f5e8 r7:eb22de60 r6:84512b80 r5:848de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f9380 INFO: task kworker/0:606:4667 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Workqueue: events bpf_prog_free_deferred r4:84038000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafa7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853fc38c r4:84512c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84038000 r8:84512c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512c00 r8:8027f5e8 r7:eb22de60 r6:84512c80 r5:84038000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f9440 INFO: task kworker/0:607:4669 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4672 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:4672 tgid:4672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb23dd84 r8:00000002 r7:60000013 r6:eb23dd8c r5:84039800 r4:84039800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84039800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f97c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eafdf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84039800 r8:84512d2c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaff7000 r7:dddced80 r6:83018000 r5:853fcf8c r4:84512e00 INFO: task kworker/0:609:4674 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 task:kworker/0:610 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f9b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8403b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb247000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fd38c r4:853fd000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853fd38c r4:84512f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8403b000 r8:84512f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84512f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84512f00 r8:8027f5e8 r7:eb241e60 r6:84512f80 r5:8403b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8403bc00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb25f000 r10:61c88647 r9:8403bc00 r8:8485302c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f99c0 INFO: task kworker/0:611:4678 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9307b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:612:4680 blocked for more than 464 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r5:00001000 r4:eb253000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:4682 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:8403d400 r4:8403d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8403d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84893040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8403d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb277000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e038d000 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 task:kworker/0:614 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848f9fc0 r5:853fdf8c r4:853fdc00 r10:61c88647 r9:8403e000 r8:8485332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853300 r8:8027f5e8 r7:eb25de60 r6:84853380 r5:8403e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848f9f00 INFO: task kworker/0:614:4684 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 93d94000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:4686 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8403ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 r5:853fe78c r4:853fe400 r4:84853400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb281d84 r8:00000002 r7:60000013 r6:eb281d8c r5:84038c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb29b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fef8c r4:853fec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853fef8c r4:84853500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84038c00 r8:8485352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853500 r8:8027f5e8 r7:eb275e60 r6:84853580 r5:84038c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84893340 INFO: task kworker/0:616:4688 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 94461000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:4690 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r5:00001000 r4:eb28f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84030000 r8:8485362c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:4693 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:84030c00 r4:84030c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84030c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84893740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84030c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ff38c r4:853ff000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ff38c r4:84853700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84030c00 r8:8485372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853700 r8:8027f5e8 r7:eb281e60 r6:84853780 r5:84030c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb299fb0 to 0xeb299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84893480 INFO: task kworker/0:618:4693 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 95064000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:619 state:D stack:0 pid:4694 tgid:4694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:84031800 r4:84031800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84031800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84893900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84031800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ff78c r4:853ff400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ff78c r4:84853800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84031800 r8:8485382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853800 r10:00000000 r9:84853800 r8:8027f5e8 r7:eb299e60 r6:84853880 r5:84031800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:4696 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:84032400 r4:84032400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84032400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848fbfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84032400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540878c r4:85408400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540878c r4:84853900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84032400 r8:8485392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853900 r8:8027f5e8 r7:eb2a5e60 r6:84853980 r5:84032400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:4698 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2bdd84 r8:00000002 r7:60000113 r6:eb2bdd8c r5:84033000 r4:84033000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84033000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84893a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84033000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ffb8c r4:853ff800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ffb8c r4:84853a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84033000 r8:84853a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853a00 r8:8027f5e8 r7:eb2b1e60 r6:84853a80 r5:84033000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84893bc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84034800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fff8c r4:853ffc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853fff8c r4:84853b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84034800 r8:84853b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853b00 r8:8027f5e8 r7:eb2b1e60 r6:84853b80 r5:84034800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84893880 INFO: task kworker/0:622:4699 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 95d3b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/1:167:4703 blocked for more than 464 seconds. r4:84035400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84137380 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:4704 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:84036000 r4:84036000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84036000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e05c7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84036000 r8:84853cac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:624 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:84036c00 r4:84036c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84036c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea78b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85408b8c r4:85408800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85408b8c r4:84853d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84036c00 r8:84853dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853d80 r8:8027f5e8 r7:eb2b1e60 r6:84853e00 r5:84036c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848fbe80 INFO: task kworker/0:624:4707 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 96cff000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85408f8c r4:85408c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85408f8c r4:84853e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84033c00 r8:84853eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84853e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84853e80 r8:8027f5e8 r7:eb025e60 r6:84853f00 r5:84033c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85474180 INFO: task kworker/0:625:4709 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:4712 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:85440000 r4:85440000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85440000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85440000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea93f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540938c r4:85409000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540938c r4:84853f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb105fb0 to 0xeb105ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:4716 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb129d84 r8:00000002 r7:60000013 r6:eb129d8c r5:85441800 r4:85441800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85441800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa73000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa9b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b6d780 INFO: task kworker/0:630:4719 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb135d84 r8:00000002 r7:60000013 r6:eb135d8c r5:85443000 r4:85443000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85443000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85443000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540a38c r4:8540a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540a38c r4:85472380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443000 r8:854723ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472380 r8:8027f5e8 r7:eb111e60 r6:85472400 r5:85443000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85474640 INFO: task kworker/0:630:4719 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 98455000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaae3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85443c00 r8:854724ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540b38c r4:85472580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85444800 r8:854725ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472580 r8:8027f5e8 r7:eb12de60 r6:85472600 r5:85444800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85474a40 INFO: task kworker/0:632:4724 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 98455000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:4725 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:85445400 r4:00000000 r4:00000000 r5:00001000 r4:eab0f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb15dfb0 to 0xeb15dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:634 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85472780 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:4730 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:84948000 r4:84948000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84948000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85487040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84948000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540b78c r4:8540b400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540b78c r4:85472880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84948000 r8:854728ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472880 r8:8027f5e8 r7:eb145e60 r6:85472900 r5:84948000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85487100 INFO: task kworker/0:635:4730 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 999b0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:4731 blocked for more than 465 seconds. task:kworker/0:636 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eac4d000 r5:8540bb8c r4:8540b800 r10:61c88647 r9:84948c00 r8:854729ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85487100 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540bf8c r4:8540bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8540bf8c r4:85472a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84949800 r8:85472aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85472a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472a80 r8:8027f5e8 r7:eb179e60 r6:85472b00 r5:84949800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85487300 INFO: task kworker/0:637:4733 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9a58b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85487900 r5:00001000 r4:eaec1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8494a400 r8:85472bac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:639 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eaeaf000 r5:854b038c r4:854b0000 r10:61c88647 r9:8494b000 r8:85472cac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854875c0 INFO: task kworker/0:639:4737 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9b53f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r9:83018005 r8:8494bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:00001000 r4:eaee9000 r5:854b0b8c r4:854b0800 r10:61c88647 r9:8494bc00 r8:85472dac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: 9b53f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaf03000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85487780 INFO: task kworker/0:641:4740 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9be5a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:4743 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:8494d400 r4:8494d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bf240 r5:00001000 r4:eb0f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b1b8c r4:854b1800 r7:dddced80 r6:83018000 r5:854b1b8c r4:85472f80 r10:61c88647 r9:8494d400 r8:85472fac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r4:85487a00 Workqueue: events bpf_prog_free_deferred [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb027000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494e000 r8:854930ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493080 r8:8027f5e8 r7:eb1bde60 r6:85493100 r5:8494e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85487a00 INFO: task kworker/0:643:4744 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9c7d5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:4747 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1ddd84 r8:00000002 r7:60000113 r6:eb1ddd8c r5:85450c00 r4:85450c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r5:00001000 r4:eb07d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r5:800c0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:4748 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1edd84 r8:00000002 r7:60000013 r6:eb1edd8c r5:85451800 r4:85451800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85451800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854982c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85451800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb125000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b1f8c r4:854b1c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b1f8c r4:85493280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85451800 r8:854932ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493280 r8:8027f5e8 r7:eb1bde60 r6:85493300 r5:85451800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85487ec0 INFO: task kworker/0:645:4748 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9dbc3000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 task:kworker/0:646 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb175000 r5:854b278c r4:854b2400 r10:61c88647 r9:85453000 r8:854933ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493380 r8:8027f5e8 r7:eb1ede60 r6:85493400 r5:85453000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498140 INFO: task kworker/0:646:4751 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9dc9e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:4752 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:8541b000 r4:8541b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854984c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb159000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b238c r4:854b2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b238c r4:85493500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541b000 r8:8549352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 INFO: task kworker/0:648:4755 blocked for more than 465 seconds. Call trace: r4:8541e000 r4:00000000 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2b8c r4:854b2800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b2b8c r4:85493480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541e000 r8:854934ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493480 r8:8027f5e8 r7:eb2c1e60 r6:84137480 r5:8541e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498440 INFO: task kworker/0:648:4755 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9e48e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:649:4757 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r4:8541bc00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b378c r4:854b3400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b378c r4:85493580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541bc00 r8:854935ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493580 r8:8027f5e8 r7:eb2d1e60 r6:84137500 r5:8541bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854985c0 INFO: task kworker/0:649:4757 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9eb69000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:85452400 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2f8c r4:854b2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b2f8c r4:85493600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85452400 r8:8549362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493600 r8:8027f5e8 r7:eb2d9e60 r6:85493680 r5:85452400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854985c0 INFO: task kworker/0:650:4758 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: 9f3d6000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r5:00001000 r4:eb1d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854b338c r4:85493700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:652 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85454800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb317000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bc78c r4:854bc400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bc78c r4:85493800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85454800 r8:8549382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493800 r8:8027f5e8 r7:eb2d9e60 r6:85493880 r5:85454800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498a00 INFO: task kworker/0:652:4763 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a01b0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85455400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:00001000 r4:eb2f3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b3b8c r4:854b3800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b3b8c r4:85493900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85455400 r8:8549392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493900 r8:8027f5e8 r7:eb2dde60 r6:85493980 r5:85455400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498a00 INFO: task kworker/0:653:4764 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a01b0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:4767 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:85456000 r4:85456000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85456000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85456000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b3f8c r4:854b3c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b3f8c r4:85493a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456000 r8:85493a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493a00 r8:8027f5e8 r7:eb2dde60 r6:85493a80 r5:85456000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498cc0 INFO: task kworker/0:654:4767 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a0e74000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:4769 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:85456c00 r4:85456c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85456c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498e80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456c00 r8:85493b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493b00 r8:8027f5e8 r7:eb2dde60 r6:85493b80 r5:85456c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85498cc0 INFO: task kworker/0:655:4769 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a0e74000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:4770 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:85450000 r4:85450000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85450000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85450000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb323000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcb8c r4:854bc800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bcb8c r4:85493c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85450000 r8:85493c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493c00 r8:8027f5e8 r7:eb2dde60 r6:85493c80 r5:85450000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5080 INFO: task kworker/0:656:4770 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a13b0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:4773 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:8494ec00 r4:8494ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8494ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcf8c r4:854bcc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bcf8c r4:85493d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494ec00 r8:85493d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493d00 r8:8027f5e8 r7:eb315e60 r6:85493d80 r5:8494ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5180 INFO: task kworker/0:657:4773 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a1b0f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:4775 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2c9d84 r8:00000002 r7:60000013 r6:eb2c9d8c r5:84970c00 r4:84970c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84970c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84970c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd38c r4:854bd000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bd38c r4:85493e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84970c00 r8:85493e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493e00 r8:8027f5e8 r7:eb321e60 r6:85493e80 r5:84970c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5440 INFO: task kworker/0:658:4775 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a1d6f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:4777 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:84972400 r4:84972400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84972400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84972400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb343000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd78c r4:854bd400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bd78c r4:85493f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84972400 r8:85493f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85493f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85493f00 r8:8027f5e8 r7:eb2c9e60 r6:85493f80 r5:84972400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5500 INFO: task kworker/0:659:4777 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a1f4b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:4779 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:84973000 r4:84973000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84973000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb367000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdf8c r4:854bdc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bdf8c r4:854a3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973000 r8:854a302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3000 r8:8027f5e8 r7:eb341e60 r6:854a3080 r5:84973000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5700 INFO: task kworker/0:660:4779 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a220f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:4780 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb32dd84 r8:00000002 r7:60000013 r6:eb32dd8c r5:84971800 r4:84971800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84971800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84971800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb34f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdb8c r4:854bd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bdb8c r4:854a3100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84971800 r8:854a312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3100 r8:8027f5e8 r7:eb34de60 r6:854a3180 r5:84971800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a57c0 INFO: task kworker/0:661:4780 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a220f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:4784 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb371d84 r8:00000002 r7:60000113 r6:eb371d8c r5:84974800 r4:84974800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84974800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a5ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84974800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be38c r4:854be000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854be38c r4:854a3200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84974800 r8:854a322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3200 r8:8027f5e8 r7:eb34de60 r6:854a3280 r5:84974800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5c00 INFO: task kworker/0:662:4784 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a25b1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84975400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84975400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854be78c r4:854be400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854be78c r4:854a3300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84975400 r8:854a332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3300 r8:8027f5e8 r7:eb371e60 r6:854a3380 r5:84975400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5e80 INFO: task kworker/0:663:4786 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a292e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:4788 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:664 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb389d84 r8:00000002 r7:60000113 r6:eb389d8c r5:84976000 r4:84976000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549f540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84976000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bef8c r4:854bec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bef8c r4:854a3400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84976000 r8:854a342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3400 r8:8027f5e8 r7:eb37de60 r6:854a3480 r5:84976000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854a5e80 INFO: task kworker/0:664:4788 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a2bb9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:4789 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb395d84 r8:00000002 r7:60000113 r6:eb395d8c r5:84970000 r4:84970000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84970000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549f200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84970000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854beb8c r4:854be800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854beb8c r4:854a3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84970000 r8:854a352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3500 r8:8027f5e8 r7:eb389e60 r6:854a3580 r5:84970000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f140 INFO: task kworker/0:665:4789 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a2e23000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:4792 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb359d84 r8:00000002 r7:60000013 r6:eb359d8c r5:8541d400 r4:8541d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85551880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535b78c r4:8535b400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535b78c r4:84137580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541d400 r8:841375ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84137580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84137580 r8:8027f5e8 r7:eb0f5e60 r6:84137600 r5:8541d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ac100 INFO: task kworker/1:168:4792 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a3238000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:4794 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:4794 tgid:4794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:8541ec00 r4:8541ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8541ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549f940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bfb8c r4:854bf800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bfb8c r4:854a3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541ec00 r8:854a362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3600 r8:8027f5e8 r7:eb389e60 r6:84137680 r5:8541ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f300 INFO: task kworker/0:666:4794 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a3238000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:4795 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:85446c00 r4:85446c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85446c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549f700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85446c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf38c r4:854bf000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bf38c r4:854a3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85446c00 r8:854a36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3680 r8:8027f5e8 r7:eb365e60 r6:84137700 r5:85446c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f300 INFO: task kworker/0:667:4795 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a3238000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:4797 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:84a20000 r4:84a20000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a20000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ac9c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a20000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c4b8c r4:854c4800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c4b8c r4:84137780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20000 r8:841377ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84137780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84137780 r8:8027f5e8 r7:eb359e60 r6:84137800 r5:84a20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ac300 INFO: task kworker/1:169:4797 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a39b1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:668:4798 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:668 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84a20c00 r4:84a20c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a20c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549f7c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf78c r4:854bf400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bf78c r4:854a3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20c00 r8:854a372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3700 r8:8027f5e8 r7:eb365e60 r6:84137880 r5:84a20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f6c0 INFO: task kworker/0:668:4798 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a39b1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:4801 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:84a21800 r4:84a21800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a21800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549fc00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a21800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c438c r4:854c4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c438c r4:854a3780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a21800 r8:854a37ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3780 r8:8027f5e8 r7:eb365e60 r6:84137900 r5:84a21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f740 INFO: task kworker/0:669:4801 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a3bf6000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:4802 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:670 state:D stack:0 pid:4802 tgid:4802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:84a22400 r4:84a22400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a22400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549fa80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a22400 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bff8c r4:854bfc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bff8c r4:854a3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a22400 r8:854a382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3800 r8:8027f5e8 r7:eb3d1e60 r6:84137980 r5:84a22400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f6c0 INFO: task kworker/0:670:4802 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a3bf6000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:4804 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:84a23000 r4:84a23000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a23000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ff00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcf9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c538c r4:854c5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c538c r4:854a3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23000 r8:854a38ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3880 r8:8027f5e8 r7:eb3d1e60 r6:84137a00 r5:84a23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549f6c0 INFO: task kworker/0:671:4804 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a4050000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549fcc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c478c r4:854c4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c478c r4:854a3900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:854a392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3900 r8:8027f5e8 r7:eb3e1e60 r6:84137a80 r5:84a24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8549fb80 INFO: task kworker/0:672:4806 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a4050000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e46b7000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854a3980 r8:8027f5e8 r7:eb3e1e60 r6:84137b00 r5:84a25400 Workqueue: events bpf_prog_free_deferred 5d20: a44e9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:4812 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:84a26c00 r4:84a26c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a26c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85487ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e02a3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c578c r4:854c5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c578c r4:854a3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a26c00 r8:854a3a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854acec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85358f8c r4:85358c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85358f8c r4:84137c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8000 r8:84137c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84137c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84137c00 r8:8027f5e8 r7:eb359e60 r6:84137c80 r5:854f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ace80 INFO: task kworker/1:170:4814 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r5:00001000 r4:eaff5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854c9f8c r4:84137d00 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:4816 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb259d84 r8:00000002 r7:60000113 r6:eb259d8c r5:854f9800 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0407000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c5b8c r4:854c5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c5b8c r4:854a3a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f9800 r8:854a3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3a80 r8:8027f5e8 r7:eb409e60 r6:84137e00 r5:854f9800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:4819 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb271d84 r8:00000002 r7:60000013 r6:eb271d8c r5:854fb000 r4:854fb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea903000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c678c r4:854c6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c678c r4:854a3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fb000 r8:854a3b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3b00 r8:8027f5e8 r7:eb409e60 r6:84137e80 r5:854fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:4821 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eafbdd84 r8:00000002 r7:60000013 r6:eafbdd8c r5:84973c00 r4:84973c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ea847000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854c638c r4:854c6000 r10:61c88647 r9:84973c00 r8:854a3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ad180 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 task:kworker/0:678 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea9f9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb289fb0 to 0xeb289ff8) INFO: task kworker/0:678:4823 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:4827 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb295d84 r8:00000002 r7:60000013 r6:eb295d8c r5:84860000 r4:84860000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad9c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c738c r4:854c7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c738c r4:854a3d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:854a3dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3d80 r8:8027f5e8 r7:eb289e60 r6:854a3e00 r5:84860000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad500 INFO: task kworker/0:679:4827 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a55bf000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:680 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c6f8c r4:854c6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c6f8c r4:854a3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:854a3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a3e80 r8:8027f5e8 r7:eb295e60 r6:854a3f00 r5:84860c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad500 INFO: task kworker/0:680:4828 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a55bf000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r5:00001000 r4:ead85000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a5b02000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:4832 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb2b9d84 r8:00000002 r7:60000013 r6:eb2b9d8c r5:84862400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eac47000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c778c r4:854c7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c778c r4:849b8080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:849b80ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8080 r8:8027f5e8 r7:eb2a1e60 r6:849b8100 r5:84862400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad840 INFO: task kworker/0:682:4832 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a5b02000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb411d84 r8:00000002 r7:60000013 r6:eb411d8c r5:84863000 r4:84863000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84863000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eadbb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r5:00001000 r4:eae21000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c878c r4:849b8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fc800 r8:849b82ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8280 r8:8027f5e8 r7:eb411e60 r6:84137f80 r5:854fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854adcc0 INFO: task kworker/0:684:4836 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a654d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:854fbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfb000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb435fb0 to 0xeb435ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/0:686:4840 blocked for more than 466 seconds. r5:854fa400 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf61000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c8f8c r4:854c8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c8f8c r4:849b8380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fa400 r8:849b83ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8380 r8:8027f5e8 r7:eb431e60 r6:849e8080 r5:854fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ade80 INFO: task kworker/0:686:4840 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a688d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854fd400 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849172c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c8b8c r4:854c8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c8b8c r4:849b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fd400 r8:849b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8400 r8:8027f5e8 r7:eb441e60 r6:849e8100 r5:854fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8547ad80 INFO: task kworker/0:687:4841 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a6bc8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:00001000 r4:eb261000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a23c00 r8:849b84ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:688:4844 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a6e30000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:4845 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:854fec00 r4:854fec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84800300 r5:00001000 r4:eaf99000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854c938c r4:849b8500 Exception stack(0xeb455fb0 to 0xeb455ff8) INFO: task kworker/0:689:4845 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r5:00001000 r4:eafb9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a26000 r8:849b85ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84800340 INFO: task kworker/0:690:4847 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a760c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:4849 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:854f0c00 r4:854f0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84800540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c9b8c r4:854c9800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c9b8c r4:849b8600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb465fb0 to 0xeb465ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r5:00001000 r4:eb1cb000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ca38c r4:849b8680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f0000 r8:849b86ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8680 r8:8027f5e8 r7:eb451e60 r6:849e8380 r5:854f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84800600 INFO: task kworker/0:692:4851 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a784c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:4854 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:854f2400 r4:854f2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r5:00001000 r4:eb1ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ca78c r4:854ca400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ca78c r4:849b8700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f2400 r8:849b872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8700 r8:8027f5e8 r7:eb451e60 r6:849e8400 r5:854f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848007c0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb479fb0 to 0xeb479ff8) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/1:173:4857 blocked for more than 466 seconds. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85359b8c r4:85359800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85359b8c r4:849e8580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f3c00 r8:849e85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e8580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e8580 r8:8027f5e8 r7:eb359e60 r6:849e8600 r5:854f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r5:00001000 r4:eb291000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:849b8780 r8:8027f5e8 r7:eb451e60 r6:849e8680 r5:854f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84800700 INFO: task kworker/0:694:4860 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a80bc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:854f5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 r5:00001000 r4:eb40d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854f5400 r8:849b882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84800b00 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 task:kworker/0:696 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r5:00001000 r4:eb4a9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cbf8c r4:849b8880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f6000 r8:849b88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8880 r8:8027f5e8 r7:eb481e60 r6:849e8780 r5:854f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84800a80 INFO: task kworker/0:696:4864 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a8425000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:4866 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:854f6c00 r4:854f6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:854f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:00001000 r4:eb4a1000 r5:854cbb8c r4:854cb800 r10:61c88647 r9:854f6c00 r8:849e882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:854f1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb499e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84800f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cb78c r4:854cb400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cb78c r4:849b8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f1800 r8:849b892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8900 r8:8027f5e8 r7:eb48de60 r6:849e8900 r5:854f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb499fb0 to 0xeb499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84800b00 INFO: task kworker/0:697:4867 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a88fd000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:4870 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:854fe000 r4:854fe000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fe000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b419c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85359f8c r4:85359c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85359f8c r4:849e8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fe000 r8:849e89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 task:kworker/0:698 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r5:00001000 r4:eb4c1000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:4874 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:85500c00 r4:85500c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85500c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423f100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d438c r4:854d4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d438c r4:849b8a80 r4:849b8a80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84863c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r5:00001000 r4:eb4cd000 r5:854d4b8c r4:854d4800 r4:849b8b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:4879 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:84865400 r4:84865400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84865400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423f580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84865400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d4f8c r4:854d4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d4f8c r4:849b8c00 r4:849b8c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:4881 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:84866000 r4:84866000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84866000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423f6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84866000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d538c r4:854d5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d538c r4:849b8d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84866000 r8:849b8d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8d00 r8:8027f5e8 r7:eb4e9e60 r6:849b8d80 r5:84866000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8423f400 INFO: task kworker/0:702:4881 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a9404000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:703:4882 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:703 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:84866c00 r4:84866c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84866c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423f900 r9:83018005 r8:84866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 r5:00001000 r4:eb4fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849b8e00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:703:4882 is blocked on a mutex likely owned by task kworker/1:97:3681. r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a9932000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:4885 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:84864800 r4:84864800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84864800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423fa00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84864800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb505000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d5b8c r4:854d5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d5b8c r4:849b8f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84864800 r8:849b8f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8f00 r8:8027f5e8 r7:eb4d1e60 r6:849b8f80 r5:84864800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8423f780 INFO: task kworker/0:704:4885 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a9b55000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:705:4887 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:85510000 r4:85510000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85510000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423fbc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85510000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb511000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d5f8c r4:854d5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d5f8c r4:849b8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85510000 r8:849b89ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849b8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b8980 r8:8027f5e8 r7:eb4f5e60 r6:84b33000 r5:85510000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8423f940 INFO: task kworker/0:705:4887 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: a9ebf000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:4888 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85510c00 r4:85510c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85510c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855536c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb345000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535a78c r4:8535a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535a78c r4:849e8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85510c00 r8:849e8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849e8b80 r8:8027f5e8 r7:eb359e60 r6:84b33080 r5:85510c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b41980 INFO: task kworker/1:176:4888 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r5:00001000 r4:dfa07000 r5:854d638c r4:854d6000 r10:61c88647 r9:85511800 r8:84b3312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8423f9c0 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:4891 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:85512400 r4:85512400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85512400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84800ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85512400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d678c r4:854d6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d678c r4:84b33200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85512400 r8:84b3322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33200 r8:8027f5e8 r7:eb515e60 r6:84b33280 r5:85512400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8423f9c0 INFO: task kworker/0:707:4891 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aa26b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:708 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0437000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85513c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:4898 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb2f9d84 r8:00000002 r7:60000013 r6:eb2f9d8c r5:85514800 r4:85514800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85514800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85514800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d6f8c r4:854d6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d6f8c r4:84b33500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85514800 r8:84b3352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33500 r8:8027f5e8 r7:eb311e60 r6:84b33580 r5:85514800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2b240 INFO: task kworker/0:710:4898 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aa92f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:4900 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb31dd84 r8:00000002 r7:60000013 r6:eb31dd8c r5:85515400 r4:85515400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85515400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e870f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d738c r4:854d7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d738c r4:84b33600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85515400 r8:84b3362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33600 r8:8027f5e8 r7:eb311e60 r6:84b33680 r5:85515400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2b3c0 INFO: task kworker/0:711:4900 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aa92f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:4902 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb329d84 r8:00000002 r7:60000113 r6:eb329d8c r5:85516000 r4:85516000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85516000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85516000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea7b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d778c r4:854d7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d778c r4:84b33700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516000 r8:84b3372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33700 r8:8027f5e8 r7:eb311e60 r6:84b33780 r5:85516000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2b440 INFO: task kworker/0:712:4902 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aac15000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:4904 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:85516c00 r4:85516c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85516c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85516c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea80d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854d7b8c r4:854d7800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854d7b8c r4:84b33800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516c00 r8:84b3382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33800 r8:8027f5e8 r7:eb311e60 r6:84b33880 r5:85516c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2b680 INFO: task kworker/0:713:4904 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aaf9c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:84950c00 r4:00000000 r4:00000000 r5:00001000 r4:eaa5f000 r5:854d7f8c r4:854d7c00 r10:00000000 r9:84b33900 r8:8027f5e8 r7:eb311e60 r6:84b33980 r5:84950c00 r4:84b2b680 INFO: task kworker/0:714:4905 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aaf9c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:4908 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:84950000 r4:84950000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84950000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2bf00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84950000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dc78c r4:854dc400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dc78c r4:84b33a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950000 r8:84b33a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33a00 r8:8027f5e8 r7:eb311e60 r6:84b33a80 r5:84950000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2b900 INFO: task kworker/0:715:4908 is blocked on a mutex likely owned by task kworker/1:97:3681. Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:716 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84952400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84952400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8423ff00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84952400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dcb8c r4:854dc800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dcb8c r4:84b33b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84952400 r8:84b33b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33b00 r8:8027f5e8 r7:eb36de60 r6:84b33b80 r5:84952400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b2bd80 INFO: task kworker/0:716:4911 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ab6a6000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b6e700 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84953c00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84953c00 r8:84b33cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84b33c80 r8:8027f5e8 r7:eb379e60 r6:84b33d00 r5:84953c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb385fb0 to 0xeb385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b3080 INFO: task kworker/0:717:4913 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ab78f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:4915 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:84954800 r4:84954800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84954800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84954800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dd38c r4:854dd000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dd38c r4:84b33c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84954800 r8:84b33c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33c00 r8:8027f5e8 r7:eb385e60 r6:84b33d80 r5:84954800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:4917 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb39dd84 r8:00000002 r7:60000013 r6:eb39dd8c r5:84955400 r4:84955400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84955400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84955400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac91000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dd78c r4:854dd400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dd78c r4:84b33e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84955400 r8:84b33e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33e00 r8:8027f5e8 r7:eb391e60 r6:84b33e80 r5:84955400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b3380 INFO: task kworker/0:719:4917 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aba93000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:4919 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3a9d84 r8:00000002 r7:60000013 r6:eb3a9d8c r5:84951800 r4:84951800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84951800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84951800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ddf8c r4:854ddc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ddf8c r4:84b33f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84951800 r8:84b33f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b33f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b33f00 r8:8027f5e8 r7:eb39de60 r6:84b33f80 r5:84951800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b37c0 INFO: task kworker/0:720:4919 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: abf07000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:84953000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84953000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ddb8c r4:854dd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ddb8c r4:847fd000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953000 r8:847fd02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd000 r8:8027f5e8 r7:eb3a9e60 r6:847fd080 r5:84953000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b3440 INFO: task kworker/0:721:4921 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: abf07000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:4923 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb3cdd84 r8:00000002 r7:60000013 r6:eb3cdd8c r5:85520000 r4:85520000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85520000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85520000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854de38c r4:854de000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854de38c r4:847fd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520000 r8:847fd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd100 r8:8027f5e8 r7:eb3a9e60 r6:847fd180 r5:85520000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:722:4923 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:723:4925 blocked for more than 467 seconds. r4:85521800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r5:00001000 r4:eb0a9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:854deb8c r4:847fd200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:4927 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb349d84 r8:00000002 r7:60000013 r6:eb349d8c r5:85502400 r4:85502400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85502400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b3f00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85502400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854de78c r4:854de400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854de78c r4:847fd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85502400 r8:847fd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd300 r8:8027f5e8 r7:eb3d9e60 r6:849e8c00 r5:85502400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b3d80 INFO: task kworker/0:724:4927 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:85504800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r5:00001000 r4:eb10d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847fd380 Exception stack(0xeb405fb0 to 0xeb405ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ac963000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:4932 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:85503000 r4:85503000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85503000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85503000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854df38c r4:854df000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854df38c r4:847fd400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85503000 r8:847fd42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd400 r8:8027f5e8 r7:eb405e60 r6:849e8d00 r5:85503000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:4934 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:85506000 r4:85506000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85506000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85506000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854df78c r4:854df400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854df78c r4:847fd480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506000 r8:847fd4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd480 r8:8027f5e8 r7:eb529e60 r6:849e8d80 r5:85506000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf200 INFO: task kworker/0:727:4934 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: acd49000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:728:4935 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:728 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:85503c00 r4:85503c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85503c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85503c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb199000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dfb8c r4:854df800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dfb8c r4:847fd500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85503c00 r8:847fd52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd500 r8:8027f5e8 r7:eb52de60 r6:849e8e00 r5:85503c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf200 INFO: task kworker/0:728:4935 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: acd49000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:4937 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb535d84 r8:00000002 r7:60000113 r6:eb535d8c r5:85506c00 r4:85506c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85506c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85506c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e838c r4:854e8000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e838c r4:847fd580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506c00 r8:847fd5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd580 r8:8027f5e8 r7:eb531e60 r6:849e8e80 r5:85506c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf380 INFO: task kworker/0:729:4937 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ad0dc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:4939 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:4939 tgid:4939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:85505400 r4:85505400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85505400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85505400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dff8c r4:854dfc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854dff8c r4:847fd600 r10:61c88647 r9:85505400 r8:847fd62c r7:82804d40 r6:dddced80 r5:dddceda0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd600 r8:8027f5e8 r7:eb535e60 r6:849e8f00 r5:85505400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf180 INFO: task kworker/0:730:4939 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ad0dc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:4941 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:85501800 r4:85501800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85501800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf8c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85501800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb301000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e878c r4:854e8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e878c r4:847fd680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85501800 r8:847fd6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd680 r8:8027f5e8 r7:eb535e60 r6:849e8f80 r5:85501800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf440 INFO: task kworker/0:731:4941 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ad5a0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:4943 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:84a28c00 r4:84a28c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb571000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9f8c r4:854e9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e9f8c r4:847fd700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:847fd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd700 r8:8027f5e8 r7:eb53de60 r6:85556000 r5:84a28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf740 INFO: task kworker/0:732:4943 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:733:4944 blocked for more than 467 seconds. r10:82918930 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:84a29800 r4:00000000 r4:00000000 r5:00001000 r4:eb331000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cf740 INFO: task kworker/0:733:4944 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: adce1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:4947 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:84a2a400 r4:84a2a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:00001000 r4:eb3a5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb361fb0 to 0xeb361ff8) r4:85553700 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:4949 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:84a2b000 r4:84a2b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2b000 r4:8291892c r4:00000000 r5:00001000 r4:eb375000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a2b000 r8:847fd82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3b9000 r5:854e8f8c r4:854e8c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:178:4951 is blocked on a mutex likely owned by task kworker/1:97:3681. r5:800c0113 r4:80239bb0 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:4953 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:735:4955 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:735 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:84a2e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cfd80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a2e000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e938c r4:854e9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e938c r4:847fd880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2e000 r8:847fd8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd880 r8:8027f5e8 r7:eb545e60 r6:85556480 r5:84a2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:735:4955 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb555000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e978c r4:854e9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847cfe40 INFO: task kworker/0:736:4957 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ae618000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:4958 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb575d84 r8:00000002 r7:60000013 r6:eb575d8c r5:84a2d400 r4:84a2d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cfb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9b8c r4:854e9800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854e9b8c r4:847fd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:847fd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fd980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb575fb0 to 0xeb575ff8) Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ae955000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:4961 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:738 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:84a28000 r4:84a28000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a28000 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ea38c r4:854ea000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ea38c r4:847fda00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:847fda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fda00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fda00 r8:8027f5e8 r7:eb545e60 r6:85556600 r5:84a28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cffc0 INFO: task kworker/0:738:4961 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aecab000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:4963 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:84958000 r4:84958000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84958000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84958000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84917200 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r5:00001000 r4:dfe3d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:4968 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:741 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:84959800 r4:84959800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84959800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e048f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eb38c r4:854eb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854eb38c r4:847fdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:847fdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fdc00 r8:8027f5e8 r7:eb449e60 r6:85556800 r5:8495a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82918930 r9:eb58dd84 r8:00000002 r7:60000013 r6:eb58dd8c r5:8495b000 r5:00001000 r4:ea835000 r5:854eb78c r4:854eb400 Exception stack(0xeb58dfb0 to 0xeb58dff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:8495bc00 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:745:4976 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:745 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:8495c800 r4:8495c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8495c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558c38c r4:8558c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558c38c r4:847fdd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495c800 r8:847fddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fdd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fdd80 r8:8027f5e8 r7:eb591e60 r6:85556980 r5:8495c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:745:4976 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 r5:84ab1b8c r4:84ab1800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb595d84 r8:00000002 r7:60000013 r6:eb595d8c r5:8495d400 r4:00000000 r5:00001000 r4:eae8d000 r7:dddced80 r6:83018000 r5:8558cf8c r4:847fde00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8554e880 INFO: task kworker/0:746:4978 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: af82b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8495e000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eac6d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8558c78c r4:8558c400 r10:61c88647 r9:8495e000 r8:847fdeac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:800c0113 r4:80239bb0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:8558cb8c r4:847fdf00 r4:8554ea80 Exception stack(0xe0545d28 to 0xe0545d70) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb3fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535bb8c r4:8535b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535bb8c r4:85556b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590000 r8:85556bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85556b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85556b80 r8:8027f5e8 r7:eb359e60 r6:85556c00 r5:85590000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85551680 INFO: task kworker/1:180:4984 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: aff8e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6d780 r10:82918930 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:85590c00 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8558d78c r4:847fdf80 Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Call trace: r4:00000000 r5:00001000 r4:eaf8d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8558d38c r4:8558d000 r7:dddced80 r6:83018000 r5:8558d38c r4:847cb000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:4991 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5b5d84 r8:00000002 r7:60000013 r6:eb5b5d8c r5:85591800 r4:85591800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85591800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85591800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafeb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558db8c r4:8558d800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558db8c r4:847cb080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85591800 r8:847cb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb080 r8:8027f5e8 r7:eb5a1e60 r6:85556d80 r5:85591800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847cfa00 INFO: task kworker/0:751:4991 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b067a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8558fb8c r4:8558f800 r10:61c88647 r9:85593000 r8:847cb12c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b0909000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:4995 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:85595400 r4:85595400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85595400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554ef00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85595400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558df8c r4:8558dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558df8c r4:847cb180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85595400 r8:847cb1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb180 r8:8027f5e8 r7:eb5bde60 r6:85556e80 r5:85595400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8554e6c0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ab1b8c r4:84ab1800 r4:84b6e700 r4:00000001 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:4996 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:85593c00 r4:85593c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85593c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85593c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558e38c r4:8558e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558e38c r4:847cb200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593c00 r8:847cb22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb200 r8:8027f5e8 r7:eb5bde60 r6:85556f00 r5:85593c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3080 INFO: task kworker/0:754:4996 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b0b59000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85594800 r4:8291892c r4:00000000 r9:83018005 r8:85594800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:00001000 r4:eb249000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) r4:847c3200 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:85420000 r4:8291892c r4:00000000 r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:00001000 r4:eb26d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558eb8c r4:8558e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558eb8c r4:847cb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85420000 r8:847cb32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb300 r8:8027f5e8 r7:eb5bde60 r6:85560000 r5:85420000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3240 INFO: task kworker/0:756:5000 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b1190000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:5002 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:85421800 r4:85421800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85421800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb2a9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558ef8c r4:8558ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558ef8c r4:847cb380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85421800 r8:847cb3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb380 r8:8027f5e8 r7:eb5bde60 r6:85560080 r5:85421800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3280 INFO: task kworker/0:757:5002 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b1190000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:5005 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:85422400 r4:85422400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85422400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb487000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535bf8c r4:8535bc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8535bf8c r4:85560100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85422400 r8:8556012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85560100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560100 r8:8027f5e8 r7:eb3e9e60 r6:85560180 r5:85422400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855630c0 INFO: task kworker/1:181:5005 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b1190000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85423000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85423000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558f38c r4:8558f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558f38c r4:847cb400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85423000 r8:847cb42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb400 r8:8027f5e8 r7:eb5bde60 r6:85560200 r5:85423000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3600 INFO: task kworker/0:758:5007 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b1683000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:5008 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb5f1d84 r8:00000002 r7:60000013 r6:eb5f1d8c r5:85423c00 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb457000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6e700 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:5009 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:85424800 r4:85424800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85424800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e5f8c r4:844e5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e5f8c r4:85560300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85424800 r8:8556032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85560300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560300 r8:8027f5e8 r7:eb5a5e60 r6:85560380 r5:85424800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b1b1e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:85425400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb49b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558ff8c r4:8558fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8558ff8c r4:847cb500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85425400 r8:847cb52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb500 r8:8027f5e8 r7:eb5bde60 r6:85560400 r5:85425400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3540 INFO: task kworker/0:760:5012 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 r5:00001000 r4:e038d000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb4f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855c8b8c r4:855c8800 r10:61c88647 r9:85426000 r8:847cb5ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) r4:847c3280 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:5016 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:85426c00 r4:85426c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85426c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85426c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e578c r4:844e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e578c r4:85560500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85426c00 r8:8556052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85560500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560500 r8:8027f5e8 r7:eb5f5e60 r6:85560580 r5:85426c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 task:kworker/1:184 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:e0545dc0 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85596c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c838c r4:855c8000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c838c r4:847cb600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85596c00 r8:847cb62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb600 r8:8027f5e8 r7:eb5f9e60 r6:85560700 r5:85596c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3c40 INFO: task kworker/0:762:5020 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b25ba000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5022 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85428000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:855c878c r4:847cb680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85428000 r8:847cb6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb680 r8:8027f5e8 r7:eb5f9e60 r6:85560780 r5:85428000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c3dc0 INFO: task kworker/0:763:5022 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b273d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:5025 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85428c00 r4:85428c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85428c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r5:00001000 r4:eb639000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85428c00 r8:8556082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb501000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855c8f8c r4:847cb700 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b2b9d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:8542a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555e2c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb621000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554038c r4:85540000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554038c r4:85560980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542a400 r8:855609ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85560980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560980 r8:8027f5e8 r7:eb601e60 r6:85560a00 r5:8542a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85563e00 INFO: task kworker/1:186:5029 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b2d53000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8542b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c20c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c938c r4:855c9000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c938c r4:847cb780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542b000 r8:847cb7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb780 r8:8027f5e8 r7:eb611e60 r6:85560a80 r5:8542b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2000 INFO: task kworker/0:765:5030 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:766 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8542bc00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c2780 r5:00001000 r4:eb641000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:766:5032 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:767 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r9:83018005 r8:8542c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r5:00001000 r4:eb585000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c978c r4:855c9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c978c r4:847cb880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542c800 r8:847cb8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb880 r8:8027f5e8 r7:eb61de60 r6:85560b80 r5:8542c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2140 INFO: task kworker/0:767:5033 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b32bd000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:5036 blocked for more than 468 seconds. r10:82918930 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:8542d400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb62d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847c2140 Call trace: r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:e0545dc0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:5038 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb631d84 r8:00000002 r7:60000113 r6:eb631d8c r5:8542e000 r4:8542e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85541b8c r4:85541800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85541b8c r4:85560c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542e000 r8:85560cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85560c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560c80 r8:8027f5e8 r7:eb601e60 r6:85560d00 r5:8542e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8555e340 INFO: task kworker/1:187:5038 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b36e4000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5041 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:84bb0000 r4:84bb0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bb0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c2ac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ca78c r4:855ca400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ca78c r4:847cb980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bb0000 r8:847cb9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cb980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cb980 r8:8027f5e8 r7:eb61de60 r6:85560d80 r5:84bb0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2640 INFO: task kworker/0:769:5041 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b3b22000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:5042 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:84bb0c00 r4:84bb0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bb0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555e900 r4:00000000 r9:83018205 r8:84bb0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 r5:00001000 r4:eb665000 r5:85540b8c r4:85540800 r10:61c88647 r9:84bb0c00 r8:85560e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:188:5042 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r5:00001000 r4:eb651000 r5:855ca38c r4:855ca000 r10:61c88647 r9:84bb1800 r8:847cba2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb669fb0 to 0xeb669ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b483a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb681000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855caf8c r4:847cba80 Exception stack(0xeb649fb0 to 0xeb649ff8) INFO: task kworker/0:771:5047 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:84bb3000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cab8c r4:855ca800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cab8c r4:847cbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bb3000 r8:847cbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cbb00 r8:8027f5e8 r7:eb649e60 r6:8555a000 r5:84bb3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2a40 INFO: task kworker/0:772:5049 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b5325000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:5050 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:84bb3c00 r5:84bb3c00 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d140 r5:00001000 r4:eb351000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84bb3c00 r8:8555a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:e0545dc0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:84bb4800 r4:84bb4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bb4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c2f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb78c r4:855cb400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cb78c r4:847cbb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bb4800 r8:847cbbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cbb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cbb80 r8:8027f5e8 r7:eb649e60 r6:8555a180 r5:84bb4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2b80 INFO: task kworker/0:773:5052 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b5cda000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bb6000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c2e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb38c r4:855cb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cb38c r4:847cbc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bb6000 r8:847cbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cbc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cbc00 r8:8027f5e8 r7:eb695e60 r6:8555a200 r5:84bb6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:85600000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r5:00001000 r4:eb6ad000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5058 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:85601800 r4:85601800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85601800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c3d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85601800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbf8c r4:855cbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cbf8c r4:847cbd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85601800 r8:847cbd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cbd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cbd00 r8:8027f5e8 r7:eb6b5e60 r6:8555a300 r5:85601800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2fc0 INFO: task kworker/0:776:5058 is blocked on a mutex likely owned by task kworker/1:97:3681. Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:777:5059 blocked for more than 469 seconds. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb6ed000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ccb8c r4:855cc800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ccb8c r4:847cbd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85602400 r8:847cbdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cbd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cbd80 r8:8027f5e8 r7:eb6c5e60 r6:8555a380 r5:85602400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847c2fc0 INFO: task kworker/0:777:5059 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b6aff000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 r5:855cc38c r4:855cc000 r10:61c88647 r9:85600c00 r8:847cbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855cc78c r4:847cbe80 INFO: task kworker/0:779:5063 is blocked on a mutex likely owned by task kworker/1:97:3681. r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b6aff000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5066 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:85603c00 r4:85603c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85603c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85603c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:00001000 r4:eb70d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:855cd38c r4:847cbf00 Exception stack(0xeb705fb0 to 0xeb705ff8) INFO: task kworker/0:780:5066 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb6fd000 r5:855ccf8c r4:855ccc00 r10:61c88647 r9:85520c00 r8:847cbfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85561480 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:5070 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:85525400 r4:85525400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85525400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561a00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85525400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cdb8c r4:855cd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cdb8c r4:85568080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85525400 r8:855680ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568080 r8:8027f5e8 r7:eb705e60 r6:85568100 r5:85525400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85561580 INFO: task kworker/0:782:5070 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b7be3000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85526000 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85561580 Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:5074 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:5074 tgid:5074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb71dd84 r8:00000002 r7:60000113 r6:eb71dd8c r5:85523c00 r4:85523c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85523c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85523c00 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cdf8c r4:855cdc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cdf8c r4:85568280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85523c00 r8:855682ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568280 r8:8027f5e8 r7:eb701e60 r6:85568300 r5:85523c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb71dfb0 to 0xeb71dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85561980 Exception stack(0xe0545d28 to 0xe0545d70) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5077 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb735d84 r8:00000002 r7:60000013 r6:eb735d8c r5:85522400 r4:85522400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85522400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855ce78c r4:85568480 r4:85561bc0 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561ac0 r10:61c88647 r9:85606c00 r8:855685ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:5083 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb74dd84 r8:00000002 r7:60000013 r6:eb74dd8c r5:85606000 r4:85606000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8555eb40 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bb6c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a0c0 r7:dddced80 r6:83018000 r5:855cf78c r4:85568680 Exception stack(0xeb751fb0 to 0xeb751ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85561f00 INFO: task kworker/0:789:5084 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b8d22000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5085 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:84bb5400 r4:84bb5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84bb5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eaa27000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85605400 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r5:00001000 r4:eaab1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cfb8c r4:855cf800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855cfb8c r4:85568780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85605400 r8:855687ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568780 r8:8027f5e8 r7:eb751e60 r6:8555a780 r5:85605400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8557a100 INFO: task kworker/0:791:5087 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b90fe000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85608c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaaf5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:855cff8c r4:85568800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:792:5091 is blocked on a mutex likely owned by task kworker/1:97:3681. Call trace: r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab53000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d038c r4:85568880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85524800 r8:855688ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568880 r8:8027f5e8 r7:eb765e60 r6:85568900 r5:85524800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8557a1c0 INFO: task kworker/0:793:5092 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b991a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:85526c00 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabaf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d078c r4:855d0400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d078c r4:85568980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526c00 r8:855689ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568980 r8:8027f5e8 r7:eb739e60 r6:85568a00 r5:85526c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8557a3c0 INFO: task kworker/0:794:5094 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: b9c0b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b6d780 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r5:00001000 r4:ead0f000 r7:dddced80 r6:83018000 r5:855d0b8c r4:85568a80 Exception stack(0xeb769fb0 to 0xeb769ff8) r4:8557a780 Call trace: 5d20: ba02b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:797:5100 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb775d84 r8:00000002 r7:60000013 r6:eb775d8c r5:84956c00 r4:84956c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84956c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ad80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84956c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb029000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d178c r4:855d1400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d178c r4:85568c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:85568cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568c80 r8:8027f5e8 r7:eb76de60 r6:85568d00 r5:84956c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8557a880 INFO: task kworker/0:797:5100 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ba34c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaeef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8557a880 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:799 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ae80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84920000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d1b8c r4:855d1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d1b8c r4:85568e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:85568eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85568e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85568e80 r8:8027f5e8 r7:eb775e60 r6:85568f00 r5:84920000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8557ac00 INFO: task kworker/0:799:5104 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ba87f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:800 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a000 r5:00001000 r4:eb141000 r7:dddced80 r6:83018000 r5:855d1f8c r4:85568f80 Exception stack(0xeb77dfb0 to 0xeb77dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:801:5108 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:801 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:84921800 r4:84921800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84921800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84921800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb181000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d238c r4:855d2000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d238c r4:84b9b080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84921800 r8:84b9b0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b9b080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b080 r8:8027f5e8 r7:eb77de60 r6:84b9b100 r5:84921800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9e0c0 INFO: task kworker/0:801:5108 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ba87f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855d2b8c r4:84b9b180 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bae36000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5112 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:803 state:D stack:0 pid:5112 tgid:5112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:84923000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855d278c r4:84b9b280 Exception stack(0xeb789fb0 to 0xeb789ff8) r4:84b9e180 Call trace: [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0545dc0 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855d338c r4:855d3000 r10:61c88647 r9:84923c00 r8:84b9b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:805:5117 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:805 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:84924800 r4:84924800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84924800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84924800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855d2f8c r4:855d2c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855d2f8c r4:84b9b480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84924800 r8:84b9b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b9b480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b480 r8:8027f5e8 r7:eb78de60 r6:84b9b500 r5:84924800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9e480 INFO: task kworker/0:805:5117 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bb7da000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf200 r5:00001000 r4:eae51000 r7:ddde2d80 r6:83018200 r5:855e538c r4:8555a880 r10:00000000 r9:8555a880 r8:8027f5e8 r7:eb631e60 r6:84b9b580 r5:84926000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855d3f8c r4:84b9b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926c00 r8:84b9b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b9b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b600 r8:8027f5e8 r7:eb78de60 r6:84b9b680 r5:84926c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9e840 INFO: task kworker/0:806:5122 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bc46b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:807:5123 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:807 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82918930 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:84925400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3b5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855d378c r4:84b9b700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855d3b8c r4:84b9b800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9ebc0 INFO: task kworker/0:808:5125 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bc927000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5127 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:855a8c00 r4:855a8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:00001000 r4:eb561000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) r4:84b9ecc0 Call trace: 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:855dc78c r4:84b9ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:84b9ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b9ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9ba00 r8:8027f5e8 r7:eb7a5e60 r6:84b9ba80 r5:855a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9ed40 INFO: task kworker/0:810:5129 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bcba5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb731000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7adfb0 to 0xeb7adff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bd0c4000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b77200 INFO: task kworker/0:813:5135 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bd5fb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5137 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:855ac800 r4:855ac800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ac800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7d1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) r4:84b77340 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855ddb8c r4:855dd800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ddb8c r4:84b9bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:84b9bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b9bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9bf00 r8:8027f5e8 r7:eb7c9e60 r6:84b9bf80 r5:855ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b77540 INFO: task kworker/0:815:5139 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bda2a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:816:5141 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:816 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb7e1d84 r8:00000002 r7:60000013 r6:eb7e1d8c r5:855ae000 r4:855ae000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ae000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r5:00001000 r4:eb7e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855ddf8c r4:855ddc00 r10:61c88647 r9:855ae000 r8:84b7502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b77640 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb80d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855deb8c r4:855de800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855deb8c r4:84b75100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aec00 r8:84b7512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75100 r8:8027f5e8 r7:eb7e1e60 r6:84b75180 r5:855aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b77740 INFO: task kworker/0:817:5143 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: be1ab000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84048000 r8:84b7522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b778c0 Call trace: 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:819:5147 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:819 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb815d84 r8:00000002 r7:60000013 r6:eb815d8c r5:8560b000 r4:8560b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb801000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855de78c r4:84b75300 Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b77bc0 INFO: task kworker/0:819:5147 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: be523000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaab000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:82918930 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:8560e000 r4:8560e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b64280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560e000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0395000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dfb8c r4:855df800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855dfb8c r4:84b75480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560e000 r8:84b754ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75480 r8:8027f5e8 r7:eb821e60 r6:8555aa80 r5:8560e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b77cc0 INFO: task kworker/0:822:5153 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: bec0a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:823 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 r5:00001000 r4:dfe13000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b75500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:824:5157 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:824 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb831d84 r8:00000002 r7:60000013 r6:eb831d8c r5:8560d400 r4:8560d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b64400 r5:00001000 r4:ea80f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:5159 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:8560ec00 r4:8560ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaa41000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8560ec00 r8:84b7562c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: befe1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b645c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85609800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8eb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: bf531000 ec8e7000 00000001 80239b98 7f1e5000 00000001 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac0d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84b64480 Call trace: 5d20: bf531000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:85604800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85604800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b64cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85604800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf75000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e578c r4:855e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e578c r4:84b75780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85604800 r8:84b757ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75780 r8:8027f5e8 r7:eb83de60 r6:8555ad80 r5:85604800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b647c0 INFO: task kworker/0:828:5165 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c00ab000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4f8c r4:855e4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e4f8c r4:84b75800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:84b7582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75800 r8:8027f5e8 r7:eb841e60 r6:8555ae00 r5:85610000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b64780 INFO: task kworker/0:829:5167 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c00ab000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 r5:855e6b8c r4:855e6800 r10:61c88647 r9:85611800 r8:84b758ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:85613000 r4:85613000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e05c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb503000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85542f8c r4:85542c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85542f8c r4:8555af00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:8555af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8555af00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555af00 r8:8027f5e8 r7:eb631e60 r6:8555af80 r5:85613000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bbf340 INFO: task kworker/1:191:5172 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84b64d00 Call trace: 5d20: c06d8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaff9000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b75980 r8:8027f5e8 r7:eb849e60 r6:84baa080 r5:85614800 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c06d8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5178 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:85613c00 r4:85613c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b649c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85613c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e638c r4:855e6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e638c r4:84b75a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:84b75a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75a00 r8:8027f5e8 r7:eb849e60 r6:84baa100 r5:85613c00 r4:84b64e00 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c0a34000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:834:5179 blocked for more than 470 seconds. [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4d9c0 r5:00001000 r4:eb255000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b75a80 r8:8027f5e8 r7:eb849e60 r6:84baa180 r5:85610c00 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 task:kworker/0:835 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb43d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c0fc7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:5183 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb87dd84 r8:00000002 r7:60000113 r6:eb87dd8c r5:85616000 r4:85616000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85616000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb3a1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855e6f8c r4:84b75b80 Exception stack(0xeb87dfb0 to 0xeb87dff8) r4:84b64a80 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:837:5186 blocked for more than 470 seconds. [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:eb485000 r7:dddced80 r6:83018000 r5:855e7b8c r4:84b75c00 r10:00000000 r9:84b75c00 r8:8027f5e8 r7:eb875e60 r6:84baa300 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85654100 INFO: task kworker/0:837:5186 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c1b74000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb45f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855e778c r4:84b75c80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c1b74000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:839:5190 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:5190 tgid:5190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:84049800 r4:84049800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84049800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84049800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e878c r4:855e8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e878c r4:84b75d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84049800 r8:84b75dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b75d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b75d80 r8:8027f5e8 r7:eb889e60 r6:84b75e00 r5:84049800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb49d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb811fb0 to 0xeb811ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85654380 INFO: task kworker/0:840:5191 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c2579000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:00001000 r4:eb4af000 r5:855e838c r4:855e8000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:855b3000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb5af000 r5:855e9b8c r4:855e9800 r10:61c88647 r9:855b3000 r8:8565e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85654840 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:843:5197 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:843 state:D stack:0 pid:5197 tgid:5197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8a9d84 r8:00000002 r7:60000013 r6:eb8a9d8c r5:855b0c00 r4:855b0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e8b8c r4:855e8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e8b8c r4:8565e080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:8565e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e080 r8:8027f5e8 r7:eb8a5e60 r6:84baa480 r5:855b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85654840 INFO: task kworker/0:843:5197 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c2a05000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:844:5199 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:844 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:855b4800 r4:855b4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e8f8c r4:855e8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e8f8c r4:8565e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b4800 r8:8565e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e100 r8:8027f5e8 r7:eb8a5e60 r6:84baa500 r5:855b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c2ee8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 task:kworker/0:845 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb4ff000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855e938c r4:8565e180 9fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:5203 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb891d84 r8:00000002 r7:60000013 r6:eb891d8c r5:8404bc00 r4:8404bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8404bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654ec0 r5:00001000 r4:eb517000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e978c r4:855e9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e978c r4:8565e200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8404bc00 r8:8565e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e200 r8:8027f5e8 r7:eb8a5e60 r6:8565e280 r5:8404bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85654bc0 INFO: task kworker/0:846:5203 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c2ee8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:847:5206 blocked for more than 470 seconds. r4:8404c800 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb633000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855ea78c r4:8565e300 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c2ee8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:82918930 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:8404d400 r4:8404d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8404d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566e040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8404d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e9f8c r4:855e9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e9f8c r4:8565e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8404d400 r8:8565e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e400 r8:8027f5e8 r7:eb8bde60 r6:8565e480 r5:8404d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e080 INFO: task kworker/0:848:5207 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c37ee000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:849 state:D stack:0 pid:5209 tgid:5209 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566e500 r5:00001000 r4:eb61f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855ea38c r4:8565e500 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c37ee000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 task:kworker/0:850 state:D stack:0 pid:5213 tgid:5213 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:84048c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eab8c r4:855ea800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eab8c r4:8565e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84048c00 r8:8565e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e600 r8:8027f5e8 r7:eb8bde60 r6:8565e680 r5:84048c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e2c0 INFO: task kworker/0:850:5213 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c3d60000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e8779000 r7:dddced80 r6:83018000 r5:855f438c r4:8565e700 r10:00000000 r9:8565e700 r8:8027f5e8 r7:eb8d1e60 r6:84baa600 r5:855b6000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:852 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566e980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eaf8c r4:855eac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eaf8c r4:8565e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6c00 r8:8565e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e780 r8:8027f5e8 r7:eb8d5e60 r6:84baa680 r5:855b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e680 INFO: task kworker/0:852:5216 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c3d60000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:855b5400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb6fb000 r5:8554238c r4:85542000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb66b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eb38c r4:855eb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eb38c r4:8565e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616c00 r8:8565e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e800 r8:8027f5e8 r7:eb8d5e60 r6:84baa800 r5:85616c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566ea00 INFO: task kworker/0:853:5219 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c438e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5221 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:85618c00 r4:85618c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566eb80 r5:00001000 r4:dfa4b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855eb78c r4:8565e880 Exception stack(0xeb825fb0 to 0xeb825ff8) r4:8566ea80 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:5223 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:855 state:D stack:0 pid:5223 tgid:5223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8edd84 r8:00000002 r7:60000013 r6:eb8edd8c r5:85618000 r4:85618000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ed00 r5:00001000 r4:dfacb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ebb8c r4:855eb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ebb8c r4:8565e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618000 r8:8565e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565e900 r8:8027f5e8 r7:eb8d5e60 r6:84baa900 r5:85618000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e680 INFO: task kworker/0:855:5223 is blocked on a mutex likely owned by task kworker/1:97:3681. Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:85619800 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e056d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c4a06000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:857:5227 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557af80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8561b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f478c r4:855f4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f478c r4:8565ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561b000 r8:8565ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ea00 r8:8027f5e8 r7:eb8d5e60 r6:84baaa00 r5:8561b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:858:5229 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:858 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaeb1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855f5b8c r4:8565eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561c800 r8:8565eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565eb00 r8:8027f5e8 r7:eb8fde60 r6:84baab00 r5:8561c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb901fb0 to 0xeb901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567c100 INFO: task kworker/0:859:5232 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c528b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8561d400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c340 r5:00001000 r4:eaad7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8561d400 r8:8565ebac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 task:kworker/0:861 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c4c0 r5:00001000 r4:eab5d000 r7:dddced80 r6:83018000 r5:855f538c r4:8565ec00 Exception stack(0xeb909fb0 to 0xeb909ff8) Workqueue: events bpf_prog_free_deferred 5d20: c54a7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:862:5238 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:8561ec00 r4:8561ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8561ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: c58d9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eb911d84 r8:00000002 r7:60000013 r6:eb911d8c r5:8561a400 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaef9000 r7:dddced80 r6:83018000 r5:855f5f8c r4:8565ed00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c5c15000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:5242 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb915d84 r8:00000002 r7:60000013 r6:eb915d8c r5:855b2400 r4:855b2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f678c r4:855f6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f678c r4:8565ed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:8565edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ed80 r8:8027f5e8 r7:eb911e60 r6:84baad80 r5:855b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567c700 INFO: task kworker/0:864:5242 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c5c15000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84938000 r4:8291892c r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c940 r5:00001000 r4:eb07b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938000 r8:8565ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565ee00 r8:8027f5e8 r7:eb915e60 r6:8565ee80 r5:84938000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567c700 INFO: task kworker/0:865:5244 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c5e83000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:866:5246 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:866 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb919d84 r8:00000002 r7:60000113 r6:eb919d8c r5:8493a400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cd80 r5:00001000 r4:eb189000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:800c0113 r4:80239bb0 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:5248 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:867 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:85620000 r4:85620000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85620000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b2c0 r5:00001000 r4:eb3f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:855f7f8c r4:85678000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:868:5250 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb921d84 r8:00000002 r7:60000013 r6:eb921d8c r5:85620c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c0c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85620c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f6f8c r4:855f6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6f8c r4:85678080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85620c00 r8:856780ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678080 r8:8027f5e8 r7:eb91de60 r6:84baae80 r5:85620c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567cd40 INFO: task kworker/0:868:5250 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c655e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:5252 blocked for more than 470 seconds. task:kworker/0:869 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb333000 r5:855f738c r4:855f7000 r10:61c88647 r9:85621800 r8:8567812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567cd40 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r4:84b6e700 r4:84b6d780 INFO: task kworker/0:870:5254 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:85623000 r4:85623000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85623000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ef00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85623000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb369000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f778c r4:855f7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f778c r4:85678180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85623000 r8:856781ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678180 r8:8027f5e8 r7:eb91de60 r6:84baaf80 r5:85623000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567cd40 INFO: task kworker/0:870:5254 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c6c40000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r4:e0545dc0 r4:00000000 r5:00001000 r4:e038d000 r5:84ab1b8c r4:84ab1800 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:85622400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b040 r5:00001000 r4:eb3b3000 r7:dddced80 r6:83018000 r5:855f7b8c r4:85678200 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c70ff000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:872:5258 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:872 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:85623c00 r5:85623c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb675000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8567b200 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:82918930 r9:eb949d84 r8:00000002 r7:60000113 r6:eb949d8c r5:85624800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85624800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb553000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f838c r4:855f8000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f838c r4:85678300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85624800 r8:8567832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678300 r8:8027f5e8 r7:eb941e60 r6:85683100 r5:85624800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567b140 INFO: task kworker/0:873:5260 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c76bc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:5262 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:874 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb56d000 r5:855f878c r4:855f8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85626000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567bb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85626000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f978c r4:855f9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f978c r4:85678400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85626000 r8:8567842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678400 r8:8027f5e8 r7:eb941e60 r6:85683200 r5:85626000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567b400 INFO: task kworker/0:875:5264 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c76bc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:5266 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8f1d84 r8:00000002 r7:60000113 r6:eb8f1d8c r5:84939800 r4:84939800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84939800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84939800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f8f8c r4:855f8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f8f8c r4:85678480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84939800 r8:856784ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678480 r8:8027f5e8 r7:eb959e60 r6:85678500 r5:84939800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567b540 INFO: task kworker/0:876:5266 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c76bc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:877:5268 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:877 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb697000 r4:85678580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:00001000 r4:e038d000 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb6c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f9f8c r4:855f9c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f9f8c r4:85678680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493c800 r8:856786ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678680 r8:8027f5e8 r7:eb959e60 r6:85678700 r5:8493c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567b940 INFO: task kworker/0:878:5271 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c8122000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:5273 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb961d84 r8:00000002 r7:60000013 r6:eb961d8c r5:8493d400 r4:8493d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8493d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567bc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb6b7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f9b8c r4:855f9800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f9b8c r4:85678780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:856787ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678780 r8:8027f5e8 r7:eb95de60 r6:85678800 r5:8493d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8567b940 INFO: task kworker/0:879:5273 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c8122000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:880 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85691280 r5:00001000 r4:eb721000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85678880 r10:00000000 r9:85678880 r8:8027f5e8 r7:eb95de60 r6:85678900 r5:8493e000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c85ea000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:5277 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb96dd84 r8:00000002 r7:60000013 r6:eb96dd8c r5:8493bc00 r4:8493bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8493bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567bf40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8493bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fa38c r4:855fa000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fa38c r4:85678980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493bc00 r8:856789ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678980 r8:8027f5e8 r7:eb969e60 r6:85678a00 r5:8493bc00 r4:8567bec0 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0545dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:8493ec00 r5:00001000 r4:eb713000 r7:dddced80 r6:83018000 r5:855fa78c r4:85678a80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r5:84ab1b8c r4:84ab1800 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:883:5282 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:883 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb985d84 r8:00000002 r7:60000113 r6:eb985d8c r5:8562bc00 r4:8562bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856913c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb72f000 r7:dddced80 r6:83018000 r5:855faf8c r4:85678b80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800c0113 r4:80239bb0 r5:00001000 r4:e038d000 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Call trace: r4:00000000 r5:00001000 r4:eb7c3000 r7:dddced80 r6:83018000 r5:855fbb8c r4:85678c00 INFO: task kworker/0:884:5284 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:e0545dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:5285 tgid:5285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb995d84 r8:00000002 r7:60000013 r6:eb995d8c r5:8562d400 r4:8562d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85691540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8562d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fb38c r4:855fb000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fb38c r4:85678c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562d400 r8:85678cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678c80 r8:8027f5e8 r7:eb991e60 r6:85683380 r5:8562d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85691240 INFO: task kworker/0:885:5285 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c91fc000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e04c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85542b8c r4:85542800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85542b8c r4:85683400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562e000 r8:8568342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85683400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb99dfb0 to 0xeb99dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb7b5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85678d00 r8:8027f5e8 r7:eb991e60 r6:85683500 r5:8562a400 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:887:5291 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:887 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9b5d84 r8:00000002 r7:60000013 r6:eb9b5d8c r5:8562b000 r4:8562b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85691a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8562b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572838c r4:85728000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572838c r4:85678d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562b000 r8:85678dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678d80 r8:8027f5e8 r7:eb991e60 r6:85683580 r5:8562b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b5fb0 to 0xeb9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856915c0 INFO: task kworker/0:887:5291 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: c9a8c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b6e700 r4:84b6d780 r5:8562ec00 r4:8291892c r5:00001000 r4:eb7d7000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678e00 r8:8027f5e8 r7:eb9b5e60 r6:85683600 r5:8562ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85691800 INFO: task kworker/0:888:5292 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:e0545dc0 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:889:5295 is blocked on a mutex likely owned by task kworker/1:97:3681. r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:890:5296 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:890 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:85628c00 r5:85628c00 r4:8291892c r9:83018005 r8:85628c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000001 r4:85628000 r5:00001000 r4:eb97b000 r7:dddced80 r6:83018000 r5:8572938c r4:85678f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628000 r8:85678fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85678f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85678f80 r8:8027f5e8 r7:eb9c5e60 r6:85683780 r5:85628000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85691b80 INFO: task kworker/0:891:5299 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:800c0113 r4:80239bb0 r5:84ab1b8c r4:84ab1800 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb819000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:856f0c00 r9:83018005 r8:856f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85729b8c r4:85729800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85729b8c r4:84bcd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0c00 r8:84bcd0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcd080 r8:8027f5e8 r7:eb9cde60 r6:85683880 r5:856f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85691e80 INFO: task kworker/0:893:5303 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:dddced80 r6:83018000 r5:8572978c r4:84bcd100 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85729f8c r4:85729c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85729f8c r4:84bcd180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f2400 r8:84bcd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcd180 r8:8027f5e8 r7:eb9dde60 r6:85683980 r5:856f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856841c0 INFO: task kworker/0:895:5307 is blocked on a mutex likely owned by task kworker/1:97:3681. Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:856f3000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:8572a38c r4:84bcd200 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:5311 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba19d84 r8:00000002 r7:60000013 r6:eba19d8c r5:856f4800 r4:856f4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcc600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572ab8c r4:8572a800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cb435000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:898:5312 blocked for more than 471 seconds. Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r5:00001000 r4:eba0f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572a78c r4:8572a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572a78c r4:84bcd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85626c00 r8:84bcd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcd300 r8:8027f5e8 r7:eba19e60 r6:84bcd380 r5:85626c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcc1c0 INFO: task kworker/0:898:5312 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 INFO: task kworker/0:899:5315 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:899 state:D stack:0 pid:5315 tgid:5315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:84938c00 r4:84938c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84938c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfabf000 r5:8572b78c r4:8572b400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r5:00001000 r4:e038d000 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcc700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572af8c r4:8572ac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572af8c r4:84bcd500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928000 r8:84bcd52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcd500 r8:8027f5e8 r7:eba0de60 r6:84bcd580 r5:84928000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcc480 INFO: task kworker/0:900:5316 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 INFO: task kworker/0:901:5319 blocked for more than 471 seconds. r4:00000000 r5:00001000 r4:eba3b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeba39fb0 to 0xeba39ff8) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 r4:84929800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcc740 INFO: task kworker/0:902:5320 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cc3ae000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6d780 r4:856f5400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bccc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572bb8c r4:8572b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572bb8c r4:84bcd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f5400 r8:84bcd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcd800 r8:8027f5e8 r7:eb861e60 r6:85683b00 r5:856f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bccac0 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:856f6000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bccec0 r5:8572c38c r4:8572c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: r4:82ac11e4 r5:00001000 r4:e038d000 r4:00000001 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:5327 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:5327 tgid:5327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba4dd84 r8:00000002 r7:60000013 r6:eba4dd8c r5:856f6c00 r4:856f6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bccf80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572c78c r4:8572c400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba55d84 r8:00000002 r7:60000013 r6:eba55d8c r5:856f3c00 r4:856f3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856f3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572cb8c r4:8572c800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572cb8c r4:84bcd980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f3c00 r8:84bcd9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcd980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800c0113 r4:80239bb0 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Not tainted 6.15.0-syzkaller #0 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:dddced80 r6:83018000 r5:8572db8c r4:84bcda00 Exception stack(0xe0545d28 to 0xe0545d70) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eadcb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572cf8c r4:8572cc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572cf8c r4:84bcda80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f9800 r8:84bcdaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcda80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcda80 r8:8027f5e8 r7:eba59e60 r6:85683d80 r5:856f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85684140 INFO: task kworker/0:908:5333 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:84b6e700 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:909:5334 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:909 state:D stack:0 pid:5334 tgid:5334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eae81000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8572d38c r4:84bcdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fa400 r8:84bcdb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcdb00 r8:8027f5e8 r7:eba59e60 r6:85683e00 r5:856fa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba65fb0 to 0xeba65ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2180 r10:61c88647 r9:856f8c00 r8:84bcdbac r7:82804d40 r6:dddced80 r5:dddceda0 r5:800c0113 r4:80239bb0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba75d84 r8:00000002 r7:60000013 r6:eba75d8c r5:856fb000 r4:856fb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb39f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800c0113 r4:80239bb0 r5:84ab1b8c r4:84ab1800 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:8492bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba51e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572df8c r4:8572dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572df8c r4:84bcdc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492bc00 r8:84bcdcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcdc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcdc80 r8:8027f5e8 r7:eba75e60 r6:84bcdd00 r5:8492bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2080 INFO: task kworker/0:912:5340 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:5343 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:8492c800 r4:8492c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8492c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572e38c r4:8572e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572e38c r4:84bcdd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492c800 r8:84bcddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcdd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcdd80 r8:8027f5e8 r7:eba75e60 r6:84bcde00 r5:8492c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:5344 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:8492d400 r4:8492d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8492d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572eb8c r4:8572e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572eb8c r4:84bcde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492d400 r8:84bcdeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcde80 r8:8027f5e8 r7:eba75e60 r6:84bcdf00 r5:8492d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d23c0 INFO: task kworker/0:914:5344 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ce325000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:5347 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec295d84 r8:00000002 r7:60000013 r6:ec295d8c r5:8492ec00 r4:8492ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8492ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec295e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2a80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572ef8c r4:8572ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572ef8c r4:84bcdf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492ec00 r8:84bcdfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcdf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcdf80 r8:8027f5e8 r7:eb8ade60 r6:856df000 r5:8492ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec295fb0 to 0xec295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2700 INFO: task kworker/0:915:5347 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ce325000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:5349 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec299d84 r8:00000002 r7:60000013 r6:ec299d8c r5:856fc800 r4:856fc800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fc800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec299e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572ff8c r4:8572fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572ff8c r4:856df080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fc800 r8:856df0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df080 r8:8027f5e8 r7:ec295e60 r6:85683f80 r5:856fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec299fb0 to 0xec299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2900 INFO: task kworker/0:916:5349 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ce325000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:5351 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec291d84 r8:00000002 r7:60000013 r6:ec291d8c r5:856fd400 r4:856fd400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fd400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec291e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb493000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572f38c r4:8572f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572f38c r4:856df100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fd400 r8:856df12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df100 r8:8027f5e8 r7:ec299e60 r6:856e3000 r5:856fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec291fb0 to 0xec291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2780 INFO: task kworker/0:917:5351 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ce6c7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:5355 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:5355 tgid:5355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec29dd84 r8:00000002 r7:60000113 r6:ec29dd8c r5:856fe000 r4:856fe000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fe000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec29de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2e80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572f78c r4:8572f400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572f78c r4:856df180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fe000 r8:856df1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df180 r8:8027f5e8 r7:ec299e60 r6:856e3080 r5:856fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec29dfb0 to 0xec29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2c00 INFO: task kworker/0:918:5355 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ce6c7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:5356 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:5356 tgid:5356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2a1d84 r8:00000002 r7:60000113 r6:ec2a1d8c r5:856fec00 r4:856fec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856fec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e07c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554338c r4:85543000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8554338c r4:856e3100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fec00 r8:856e312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3100 r8:8027f5e8 r7:eb851e60 r6:856e3180 r5:856fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2a1fb0 to 0xec2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e03c0 INFO: task kworker/1:194:5356 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ceb56000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:5358 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2a9d84 r8:00000002 r7:60000113 r6:ec2a9d8c r5:8492b000 r4:8492b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8492b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1080 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572fb8c r4:8572f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572fb8c r4:856df200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492b000 r8:856df22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df200 r8:8027f5e8 r7:ec299e60 r6:856df280 r5:8492b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2a9fb0 to 0xec2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d2c00 INFO: task kworker/0:919:5358 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cec58000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:5360 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2b1d84 r8:00000002 r7:60000113 r6:ec2b1d8c r5:8404ec00 r4:8404ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8404ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8404ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85543f8c r4:85543c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85543f8c r4:856e3200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8404ec00 r8:856e322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3200 r8:8027f5e8 r7:ec2a1e60 r6:856df300 r5:8404ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2b1fb0 to 0xec2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0640 INFO: task kworker/1:195:5360 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cec58000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:5362 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2b5d84 r8:00000002 r7:60000113 r6:ec2b5d8c r5:848a8000 r4:848a8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e0fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85543b8c r4:85543800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85543b8c r4:856e3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a8000 r8:856e32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3280 r8:8027f5e8 r7:ec2b1e60 r6:856df380 r5:848a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2b5fb0 to 0xec2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0640 INFO: task kworker/1:196:5362 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cef28000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:5364 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2b9d84 r8:00000002 r7:60000013 r6:ec2b9d8c r5:848a9800 r4:848a9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848a9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573878c r4:85738400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573878c r4:856df400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a9800 r8:856df42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df400 r8:8027f5e8 r7:ec299e60 r6:856df480 r5:848a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2b9fb0 to 0xec2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d10c0 INFO: task kworker/0:920:5364 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cf320000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:5366 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2bdd84 r8:00000002 r7:60000113 r6:ec2bdd8c r5:848ab000 r4:848ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573838c r4:85738000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573838c r4:856df500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ab000 r8:856df52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df500 r8:8027f5e8 r7:ec2b9e60 r6:856df580 r5:848ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2bdfb0 to 0xec2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1500 INFO: task kworker/0:921:5366 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cf320000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:5368 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb6e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8554378c r4:856df600 r10:61c88647 r9:856fbc00 r8:856df62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df600 r8:8027f5e8 r7:ec2b9e60 r6:856e3300 r5:856fbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2a5fb0 to 0xec2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1500 INFO: task kworker/0:922:5368 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cfaa8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:5370 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2c1d84 r8:00000002 r7:60000113 r6:ec2c1d8c r5:85700000 r4:85700000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85700000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d19c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85700000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85738b8c r4:85738800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85738b8c r4:856df680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700000 r8:856df6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df680 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb66f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:5373 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:5373 tgid:5373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2c9d84 r8:00000002 r7:60000013 r6:ec2c9d8c r5:85701800 r4:85701800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85701800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1e40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85701800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573978c r4:85739400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573978c r4:856df780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85701800 r8:856df7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df780 r8:8027f5e8 r7:ec2a5e60 r6:856e3480 r5:85701800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2c9fb0 to 0xec2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1340 INFO: task kworker/0:925:5373 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: cffa1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:5376 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2cdd84 r8:00000002 r7:60000113 r6:ec2cdd8c r5:85702400 r4:85702400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85702400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85702400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb803000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573938c r4:85739000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573938c r4:856df800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85702400 r8:856df82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df800 r8:8027f5e8 r7:ec2c9e60 r6:856e3500 r5:85702400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2cdfb0 to 0xec2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1b40 INFO: task kworker/0:926:5376 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d040d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:5378 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2d1d84 r8:00000002 r7:60000013 r6:ec2d1d8c r5:85703000 r4:85703000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85703000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d1f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85703000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb877000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85739b8c r4:85739800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85739b8c r4:856df880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703000 r8:856df8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df880 r8:8027f5e8 r7:ec2c9e60 r6:856e3580 r5:85703000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2d1fb0 to 0xec2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1a40 INFO: task kworker/0:927:5378 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d09a7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:5380 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:5380 tgid:5380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2d5d84 r8:00000002 r7:60000013 r6:ec2d5d8c r5:85703c00 r4:85703c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85703c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf3c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85703c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573ab8c r4:8573a800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573ab8c r4:856df900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85703c00 r8:856df92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df900 r8:8027f5e8 r7:ec2d1e60 r6:856e3600 r5:85703c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2d5fb0 to 0xec2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1d40 INFO: task kworker/0:928:5380 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d09a7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:5381 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2d9d84 r8:00000002 r7:60000113 r6:ec2d9d8c r5:85704800 r4:85704800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85704800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bcf6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85704800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85739f8c r4:85739c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85739f8c r4:856df980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85704800 r8:856df9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856df980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856df980 r8:8027f5e8 r7:ec2d5e60 r6:856e3680 r5:85704800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2d9fb0 to 0xec2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bcff00 INFO: task kworker/0:929:5381 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d104c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:5385 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2ddd84 r8:00000002 r7:60000013 r6:ec2ddd8c r5:848aa400 r4:848aa400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848aa400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d2ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573a38c r4:8573a000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573a38c r4:856dfa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848aa400 r8:856dfa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfa00 r8:8027f5e8 r7:ec2d5e60 r6:856dfa80 r5:848aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2ddfb0 to 0xec2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1e80 INFO: task kworker/0:930:5385 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d1482000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:5386 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:5386 tgid:5386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2e1d84 r8:00000002 r7:60000013 r6:ec2e1d8c r5:848abc00 r4:848abc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848abc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec289000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573a78c r4:8573a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573a78c r4:856dfb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848abc00 r8:856dfb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfb00 r8:8027f5e8 r7:ec2d5e60 r6:856dfb80 r5:848abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2e1fb0 to 0xec2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d1e80 INFO: task kworker/0:931:5386 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d1482000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:5389 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2edd84 r8:00000002 r7:60000113 r6:ec2edd8c r5:848ad400 r4:848ad400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ad400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2f5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573af8c r4:8573ac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573af8c r4:856dfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ad400 r8:856dfc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfc00 r8:8027f5e8 r7:ec2d5e60 r6:856dfc80 r5:848ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2edfb0 to 0xec2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cf340 INFO: task kworker/0:932:5389 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d1662000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:5391 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec309d84 r8:00000002 r7:60000013 r6:ec309d8c r5:848ac800 r4:848ac800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ac800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec309e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec31d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573b78c r4:8573b400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573b78c r4:856dfd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ac800 r8:856dfd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfd00 r8:8027f5e8 r7:ec2ede60 r6:856dfd80 r5:848ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec309fb0 to 0xec309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cf300 INFO: task kworker/0:933:5391 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d1bc3000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:5392 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec2add84 r8:00000002 r7:60000113 r6:ec2add8c r5:85705400 r4:85705400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85705400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85705400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565038c r4:85650000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565038c r4:856e3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85705400 r8:856e372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3700 r8:8027f5e8 r7:ec2b1e60 r6:856e3780 r5:85705400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2adfb0 to 0xec2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0900 INFO: task kworker/1:197:5392 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d23e0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:5393 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec30dd84 r8:00000002 r7:60000113 r6:ec30dd8c r5:85706c00 r4:85706c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85706c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec30de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d98c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85706c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec345000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6f8c r4:844e6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e6f8c r4:856e3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706c00 r8:856e382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3800 r8:8027f5e8 r7:ec2ade60 r6:856e3880 r5:85706c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec30dfb0 to 0xec30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0900 INFO: task kworker/1:198:5393 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d2a18000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:5394 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:5394 tgid:5394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec311d84 r8:00000002 r7:60000113 r6:ec311d8c r5:85706000 r4:85706000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85706000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec311e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf740 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec305000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573b38c r4:8573b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573b38c r4:856dfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706000 r8:856dfe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfe00 r8:8027f5e8 r7:ec309e60 r6:856e3900 r5:85706000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec311fb0 to 0xec311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cf300 INFO: task kworker/0:934:5394 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d2a18000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5398 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec339d84 r8:00000002 r7:60000013 r6:ec339d8c r5:85710c00 r4:85710c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85710c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec339e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cf980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85710c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec329000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573bb8c r4:8573b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573bb8c r4:856dfe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710c00 r8:856dfeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dfe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dfe80 r8:8027f5e8 r7:ec309e60 r6:856e3980 r5:85710c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec339fb0 to 0xec339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cf700 INFO: task kworker/0:935:5398 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d2f61000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:5401 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec355d84 r8:00000002 r7:60000113 r6:ec355d8c r5:85711800 r4:85711800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85711800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec355e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cfbc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85711800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec35d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573c38c r4:8573c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573c38c r4:856dff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85711800 r8:856dff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856dff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856dff00 r8:8027f5e8 r7:ec339e60 r6:856e3a00 r5:85711800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec355fb0 to 0xec355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856cf780 INFO: task kworker/0:936:5401 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848ae000 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec335000 r5:8573bf8c r4:8573bc00 r4:856dff80 Exception stack(0xec315fb0 to 0xec315ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec321e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d99c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec395000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6b8c r4:844e6800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e6b8c r4:856e3a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a8c00 r8:856e3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3a80 r8:8027f5e8 r7:ec2ade60 r6:856d6080 r5:848a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec321fb0 to 0xec321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d9740 INFO: task kworker/1:199:5404 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d3988000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:8492a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec369e08 r5:00001000 r4:ec365000 r5:8573c78c r4:8573c400 r10:61c88647 r9:8492a400 r8:856d612c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:5410 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec38dd84 r8:00000002 r7:60000113 r6:ec38dd8c r5:848b0c00 r4:848b0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec38de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec385000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573cf8c r4:8573cc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573cf8c r4:856d6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0c00 r8:856d632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d6300 r8:8027f5e8 r7:ec389e60 r6:856d6380 r5:848b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec38dfb0 to 0xec38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec3b9d84 r8:00000002 r7:60000013 r6:ec3b9d8c r5:848b2400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec3bf000 r5:8573d78c r4:8573d400 r4:856d6400 Exception stack(0xec3b9fb0 to 0xec3b9ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d4cd3000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:5414 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec351d84 r8:00000002 r7:60000113 r6:ec351d8c r5:85710000 r4:85710000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85710000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec351e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d9a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec39d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573d38c r4:8573d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8573d38c r4:856e3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85710000 r8:856e3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3b00 r8:8027f5e8 r7:ec2ade60 r6:856e3b80 r5:85710000 r4:00000001 Exception stack(0xec351fb0 to 0xec351ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:844e638c r4:856e3c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713c00 r8:856e3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e3c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e3c00 r8:8027f5e8 r7:ec2ade60 r6:856e3c80 r5:85713c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3a1fb0 to 0xec3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d97c0 INFO: task kworker/1:201:5416 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d5a0a000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec3c9d84 r8:00000002 r7:60000113 r6:ec3c9d8c r5:85714800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec3db000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856d6500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec3cf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8573db8c r4:856d6580 Exception stack(0xec3d9fb0 to 0xec3d9ff8) INFO: task kworker/0:943:5420 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa8f000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856d6600 r8:8027f5e8 r7:ec3c9e60 r6:856e3e00 r5:85716000 INFO: task kworker/0:944:5422 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:5423 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3f5d84 r8:00000002 r7:60000113 r6:ec3f5d8c r5:85716c00 r4:85716c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85716c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573e38c r4:8573e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573e38c r4:856d6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85716c00 r8:856d66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d6680 r8:8027f5e8 r7:ec3ede60 r6:856e3e80 r5:85716c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3f5fb0 to 0xec3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d3c80 INFO: task kworker/0:945:5423 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d770b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa7b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:946:5426 is blocked on a mutex likely owned by task kworker/1:97:3681. Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d811b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:5430 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec405d84 r8:00000002 r7:60000113 r6:ec405d8c r5:85712400 r4:85712400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85712400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec405e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85712400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573ef8c r4:8573ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856d6780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec3cdd84 r8:00000002 r7:60000113 r6:ec3cdd8c r5:848b3c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfb05000 r7:dddced80 r6:83018000 r5:844e738c r4:856d6800 r10:61c88647 r9:848b3c00 r8:856d682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856d6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d6800 r8:8027f5e8 r7:ec405e60 r6:856d6880 r5:848b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3cdfb0 to 0xec3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856d3d80 INFO: task kworker/0:948:5431 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d82a7000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r5:00001000 r4:ec535000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8573f38c r4:8573f000 r4:856d6900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:e0545dc0 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:5435 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec34dd84 r8:00000002 r7:60000013 r6:ec34dd8c r5:85718000 r4:85718000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85718000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec34de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85650f8c r4:85650c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5000 r8:8027f5e8 r7:ec2ade60 r6:856e5080 r5:85718000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec34dfb0 to 0xec34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dd100 INFO: task kworker/1:202:5435 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d8a8e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eab11000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565078c r4:85650400 r4:856e5100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:848b6000 r4:00000000 r4:00000000 r5:00001000 r4:eac19000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856e5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5180 r8:8027f5e8 r7:ec34de60 r6:856d6a80 r5:848b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dd340 INFO: task kworker/1:204:5440 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d8e49000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:5441 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:848b3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r5:00001000 r4:eaf9f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856e5200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:5444 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec411d84 r8:00000002 r7:60000013 r6:ec411d8c r5:848b6c00 r4:848b6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec411e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dd900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb119000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565178c r4:85651400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8565178c r4:856e5280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6c00 r8:856e52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5280 r8:8027f5e8 r7:eba35e60 r6:856d6b80 r5:848b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec411fb0 to 0xec411ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:5445 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:5445 tgid:5445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec415d84 r8:00000002 r7:60000113 r6:ec415d8c r5:848aec00 r4:848aec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848aec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec415e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dda80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb191000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85651b8c r4:85651800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85651b8c r4:856e5300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848aec00 r8:856e532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5300 r8:8027f5e8 r7:ec411e60 r6:856d6c00 r5:848aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec415fb0 to 0xec415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dd600 INFO: task kworker/1:207:5445 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d96d0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec425e08 r5:00001000 r4:eb2e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec425fb0 to 0xec425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dd880 INFO: task kworker/1:209:5449 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d973d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:5451 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:5451 tgid:5451 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856c0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec42de08 r5:00001000 r4:eb319000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565238c r4:85652000 r4:856e5480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec431fb0 to 0xec431ff8) INFO: task kworker/1:211:5453 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: d9c41000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:5455 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec435d84 r8:00000002 r7:60000113 r6:ec435d8c r5:856c1800 r4:856c1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec435e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:00001000 r4:eb6cf000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856e5580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85652f8c r4:856e5600 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec439fb0 to 0xec439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ddf80 INFO: task kworker/1:213:5457 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: da062000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:5459 blocked for more than 473 seconds. task:kworker/1:214 state:D stack:0 pid:5459 tgid:5459 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:856c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:eb577000 r5:8565338c r4:85653000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:856d3480 Call trace: Exception stack(0xe0545d28 to 0xe0545d70) r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec441d84 r8:00000002 r7:60000113 r6:ec441d8c r5:856c6000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb67b000 r7:ddde2d80 r6:83018200 r5:8565378c r4:856e5700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dde00 INFO: task kworker/1:215:5460 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: da3f9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:5462 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:856c3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec461e08 r5:00001000 r4:eb68b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r5:848b0000 r4:8291892c r4:00000000 r9:83018205 r8:848b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:5466 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:5466 tgid:5466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec499d84 r8:00000002 r7:60000013 r6:ec499d8c r5:848b1800 r4:848b1800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b1800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec499e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6bb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520038c r4:85200000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520038c r4:856e5880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b1800 r8:856e58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5880 r8:8027f5e8 r7:ec435e60 r6:84bcb180 r5:848b1800 r4:00000001 Exception stack(0xec499fb0 to 0xec499ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb707000 r5:85200b8c r4:85200800 r4:856e5900 Exception stack(0xec49dfb0 to 0xec49dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4a1d84 r8:00000002 r7:60000113 r6:ec4a1d8c r5:85768c00 r4:85768c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85768c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc9c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85768c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85200f8c r4:85200c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85200f8c r4:856e5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85768c00 r8:856e59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5980 r8:8027f5e8 r7:ec49de60 r6:84bcb280 r5:85768c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a1fb0 to 0xec4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdc700 INFO: task kworker/1:220:5471 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dad9b000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r5:85769800 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb72d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8576a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdcc00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8520178c r4:85201400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520178c r4:856e5a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576a400 r8:856e5aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5a80 r8:8027f5e8 r7:ec4a5e60 r6:84bcb380 r5:8576a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a9fb0 to 0xec4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdc1c0 INFO: task kworker/1:222:5475 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: db10d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4ade08 r5:00001000 r4:eb7bf000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec4adfb0 to 0xec4adff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8576bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85201f8c r4:85201c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85201f8c r4:856e5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576bc00 r8:856e5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5b80 r8:8027f5e8 r7:ec4ade60 r6:84bcb480 r5:8576bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b1fb0 to 0xec4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdca00 INFO: task kworker/1:224:5479 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: db54f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8576c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:8520238c r4:85202000 r10:61c88647 r9:8576c800 r8:856e5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdcb40 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/1:226:5483 blocked for more than 473 seconds. r4:8576d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd8340 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85202b8c r4:85202800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85202b8c r4:856e5c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576d400 r8:856e5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5c80 r8:8027f5e8 r7:ec4b5e60 r6:84bcb580 r5:8576d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b9fb0 to 0xec4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdce00 INFO: task kworker/1:226:5483 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: db843000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b6d780 task:kworker/1:227 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb7fd000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec495fb0 to 0xec495ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eb745d84 r8:00000002 r7:60000013 r6:eb745d8c r5:8571b000 r4:8571b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd84c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85202f8c r4:85202c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85202f8c r4:856e5e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571b000 r8:856e5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856e5e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e5e00 r8:8027f5e8 r7:ec4b9e60 r6:856e5e80 r5:8571b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd80c0 INFO: task kworker/1:228:5488 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dc41e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:85718c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec4bdfb0 to 0xec4bdff8) INFO: task kworker/1:229:5489 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:5491 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:5491 tgid:5491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4c1d84 r8:00000002 r7:60000013 r6:ec4c1d8c r5:8571d400 r4:8571d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd86c0 r4:00000000 r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:eb8e7000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec4c1fb0 to 0xec4c1ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc6100 r8:8027f5e8 r7:ec4bde60 r6:84bc6180 r5:8571bc00 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:8571ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c9e08 r5:00001000 r4:eb94b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85203b8c r4:85203800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85203b8c r4:84bc6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571ec00 r8:84bc622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6200 r8:8027f5e8 r7:ec4c5e60 r6:84bc6280 r5:8571ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c9fb0 to 0xec4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd8640 INFO: task kworker/1:232:5495 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dce71000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:5497 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85719800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4cde08 r5:00001000 r4:eb977000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85203f8c r4:84bc6300 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4d1d84 r8:00000002 r7:60000013 r6:ec4d1d8c r5:8571e000 r4:8571e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd8d40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513078c r4:85130400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513078c r4:84bc6400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571e000 r8:84bc642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6400 r8:8027f5e8 r7:ec4c5e60 r6:84bc6480 r5:8571e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d1fb0 to 0xec4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd8400 INFO: task kworker/1:234:5499 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dce71000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r4:85720000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r5:00001000 r4:eb9e5000 r5:85130b8c r4:85130800 r10:61c88647 r9:85720000 r8:84bc652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:235:5501 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec4d9d84 r8:00000002 r7:60000113 r6:ec4d9d8c r5:85721800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85721800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85130f8c r4:85130c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85130f8c r4:84bc6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85721800 r8:84bc662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6600 r8:8027f5e8 r7:eb999e60 r6:84bc6680 r5:85721800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d9fb0 to 0xec4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85693340 INFO: task kworker/1:236:5503 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dd22f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:5506 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85723c00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856936c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513138c r4:85131000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513138c r4:84bc6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85723c00 r8:84bc672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e1e08 r5:00001000 r4:ec445000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc6800 r8:8027f5e8 r7:ec4dde60 r6:84bc6880 r5:85722400 r4:85693340 INFO: task kworker/1:238:5507 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dd8a1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r5:85724800 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eba21000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513178c r4:85131400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513178c r4:84bc6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85724800 r8:84bc692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6900 r8:8027f5e8 r7:ec4e1e60 r6:84bc6980 r5:85724800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d5fb0 to 0xec4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856937c0 INFO: task kworker/1:239:5509 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dd8a1000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ec4e9d84 r8:00000002 r7:60000013 r6:ec4e9d8c r5:85720c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec463000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec487000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc6b80 r8:8027f5e8 r7:ec4e9e60 r6:84bc6c00 r5:85725400 INFO: task kworker/1:241:5513 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:5515 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec4fdd84 r8:00000002 r7:60000013 r6:ec4fdd8c r5:85726c00 r4:85726c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85726c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd8fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513278c r4:85132400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513278c r4:84bc6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726c00 r8:84bc6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6b00 r8:8027f5e8 r7:ec4ede60 r6:84bc6c80 r5:85726c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4fdfb0 to 0xec4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bd8e40 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec501d84 r8:00000002 r7:60000113 r6:ec501d8c r5:856c6c00 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:5520 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:8571c800 r4:8571c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec509000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85132b8c r4:85132800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84bd6100 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85726000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec529000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bcb600 r8:8027f5e8 r7:eb9a5e60 r6:84bc6f00 r5:85726000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:84ab1b8c r4:84ab1800 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:5522 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec521d84 r8:00000002 r7:60000113 r6:ec521d8c r5:856a8000 r4:856a8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856a8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec521e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd6c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513378c r4:85133400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513378c r4:84bc6f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a8000 r8:84bc6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bc6f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc6f80 r8:8027f5e8 r7:ec501e60 r6:84bd2000 r5:856a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec521fb0 to 0xec521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd6340 INFO: task kworker/1:245:5522 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb583000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec52dfb0 to 0xec52dff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:5526 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:951 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec549d84 r8:00000002 r7:60000013 r6:ec549d8c r5:856ab000 r4:856ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568ba00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0291000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573fb8c r4:8573f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573fb8c r4:84bcb680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ab000 r8:84bcb6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcb680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb680 r8:8027f5e8 r7:eb9a5e60 r6:84bd2180 r5:856ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec549fb0 to 0xec549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568b380 INFO: task kworker/0:951:5526 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: dee0c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaeb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573f78c r4:8573f400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8573f78c r4:84bcb700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856aa400 r8:84bcb72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcb700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb700 r8:8027f5e8 r7:ec549e60 r6:84bd2200 r5:856aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec54dfb0 to 0xec54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568b380 INFO: task kworker/0:952:5528 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: df197000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec555000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:5537 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3d5d84 r8:00000002 r7:60000113 r6:ec3d5d8c r5:856aec00 r4:856aec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856aec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85751b8c r4:85751800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85751b8c r4:84bcb780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856aec00 r8:84bcb7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcb780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb780 r8:8027f5e8 r7:ec549e60 r6:84bd2280 r5:856aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3d5fb0 to 0xec3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568b780 INFO: task kworker/0:953:5537 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0545fb0 to 0xe0545ff8) Not tainted 6.15.0-syzkaller #0 r5:856a8c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ea85d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec3f1fb0 to 0xec3f1ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:5540 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:955 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec569d84 r8:00000002 r7:60000113 r6:ec569d8c r5:856ad400 r4:856ad400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ad400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec569e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568bcc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575038c r4:85750000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575038c r4:84bcb880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ad400 r8:84bcb8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcb880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb880 r8:8027f5e8 r7:ec3d5e60 r6:84bd2480 r5:856ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:956:5542 blocked for more than 473 seconds. r4:856b8000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8575078c r4:85750400 r10:61c88647 r9:856b8000 r8:84bcb92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcb900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcb900 r8:8027f5e8 r7:ec3d5e60 r6:84bd2500 r5:856b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568bac0 INFO: task kworker/0:956:5542 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: df74e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:5543 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae49000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec575fb0 to 0xec575ff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ba400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r5:00001000 r4:ec55d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:5546 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec581d84 r8:00000002 r7:60000113 r6:ec581d8c r5:856bb000 r4:856bb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec581e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b4c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85750f8c r4:85750c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85750f8c r4:84bcba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bb000 r8:84bcba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcba00 r8:8027f5e8 r7:ec3d5e60 r6:84bd2700 r5:856bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec581fb0 to 0xec581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568bdc0 INFO: task kworker/0:958:5546 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:249:5547 blocked for more than 473 seconds. r4:856bbc00 r5:856bbc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dc8c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e438c r4:850e4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e438c r4:84bd2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bbc00 r8:84bd27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd2780 r8:8027f5e8 r7:ec52de60 r6:84bd2800 r5:856bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec585fb0 to 0xec585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dc200 INFO: task kworker/1:249:5547 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:856bd400 r8:84bcbaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:960:5551 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:960 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec595d84 r8:00000002 r7:60000113 r6:ec595d8c r5:856bc800 r4:856bc800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bc800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568b540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb263000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575178c r4:85751400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575178c r4:84bcbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bc800 r8:84bcbb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcbb00 r8:8027f5e8 r7:ec3d5e60 r6:84bd2900 r5:856bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd6e80 INFO: task kworker/0:960:5551 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e04d4000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r5:800c0113 r4:80239bb0 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:961:5554 blocked for more than 473 seconds. r5:856b9800 r4:8291892c [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb459000 r5:85751f8c r4:85751c00 r10:61c88647 r9:856b9800 r8:84bcbbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0545dc0 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575278c r4:85752400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575278c r4:84bcbc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bec00 r8:84bcbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcbc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcbc00 r8:8027f5e8 r7:ec5a1e60 r6:84bd2a00 r5:856bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a9fb0 to 0xec5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ec040 INFO: task kworker/0:962:5556 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e0908000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:963:5557 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:963 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5add84 r8:00000002 r7:60000013 r6:ec5add8c r5:85723000 r4:85723000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85723000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec100 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb491000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 r4:84b6d780 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb627000 r5:8575378c r4:85753400 r10:00000000 r9:84bcbd00 r8:8027f5e8 r7:ec5a9e60 r6:84bd2b00 r5:856ae000 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ec240 INFO: task kworker/0:964:5559 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e0efd000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:965:5561 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:965 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5bdd84 r8:00000002 r7:60000013 r6:ec5bdd8c r5:856ac800 r4:856ac800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ac800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb4df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85752b8c r4:84bcbd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ac800 r8:84bcbdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcbd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcbd80 r8:8027f5e8 r7:ec5b5e60 r6:84bd2b80 r5:856ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ec180 INFO: task kworker/0:965:5561 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e15c0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85780000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5cb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575338c r4:85753000 r10:61c88647 r9:85780000 r8:84bcbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/1:250:5565 blocked for more than 474 seconds. r5:85780c00 r4:8291892c [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850e738c r4:850e7000 r4:84bd2c80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:85781800 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85781800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e478c r4:850e4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e478c r4:84bd2d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85781800 r8:84bd2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd2d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd2d80 r8:8027f5e8 r7:ec32de60 r6:84bd2e00 r5:85781800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dcc40 INFO: task kworker/1:251:5567 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e19c9000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb663000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bcbe80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:5572 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec50dd84 r8:00000002 r7:60000113 r6:ec50dd8c r5:85783000 r4:85783000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85783000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858253c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85783000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e538c r4:850e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e538c r4:84bd2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85783000 r8:84bd2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bd2f00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85783c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bcbf00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: e273c000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:969:5576 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:969 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5d9d84 r8:00000002 r7:60000113 r6:ec5d9d8c r5:85785400 r4:85785400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85785400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ecd00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85785400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85753f8c r4:85753c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85753f8c r4:84bcbf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85785400 r8:84bcbfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bcbf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcbf80 r8:8027f5e8 r7:ec5d1e60 r6:856ed080 r5:85785400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8575478c r4:856e6000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:84ab1b8c r4:84ab1800 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:84b6d780 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85788000 r7:00000000 r6:83018000 r5:00001000 r4:7f027000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85754b8c r4:856e6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788000 r8:856e60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6080 r8:8027f5e8 r7:ec5e5e60 r6:856ed180 r5:85788000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e9fb0 to 0xec5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ecc00 INFO: task kworker/0:971:5580 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e2b25000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:972:5581 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:972 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5edd84 r8:00000002 r7:60000113 r6:ec5edd8c r5:85788c00 r4:85788c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85788c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8763000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754f8c r4:85754c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85754f8c r4:856e6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788c00 r8:856e612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6100 r8:8027f5e8 r7:ec5e9e60 r6:856ed200 r5:85788c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:973:5583 blocked for more than 474 seconds. r5:8578a400 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755f8c r4:85755c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85755f8c r4:856e6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578a400 r8:856e61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6180 r8:8027f5e8 r7:ec5ede60 r6:856ed280 r5:8578a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856ec740 INFO: task kworker/0:973:5583 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e320f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:e038d000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:eba41d84 r8:00000002 r7:60000013 r6:eba41d8c r5:8578bc00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800c0113 r4:80239bb0 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:5587 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec40dd84 r8:00000002 r7:60000013 r6:ec40dd8c r5:8578b000 r4:8578b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec40de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851442c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab03000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575578c r4:85755400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575578c r4:856e6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578b000 r8:856e622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6200 r8:8027f5e8 r7:eba15e60 r6:856ed380 r5:8578b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec40dfb0 to 0xec40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800c0113 r4:80239bb0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8578c800 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856e6300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800c0113 r4:80239bb0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:977 state:D stack:0 pid:5592 tgid:5592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5f5d84 r8:00000002 r7:60000113 r6:ec5f5d8c r5:8578d400 r4:8578d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85144980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578d400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85756b8c r4:85756800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85756b8c r4:856e6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578d400 r8:856e63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6380 r8:8027f5e8 r7:eba15e60 r6:856ed480 r5:8578d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f5fb0 to 0xec5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85144340 INFO: task kworker/0:977:5592 is blocked on a mutex likely owned by task kworker/1:97:3681. Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b6e700 r4:00000001 INFO: task kworker/0:978:5593 blocked for more than 474 seconds. r4:8578ec00 r4:00000000 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85144640 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e3e8e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:979:5596 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:979 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5fdd84 r8:00000002 r7:60000013 r6:ec5fdd8c r5:8578e000 r4:8578e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8578e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575678c r4:85756400 r7:dddced80 r6:83018000 r5:8575678c r4:856e6480 Exception stack(0xec5fdfb0 to 0xec5fdff8) Workqueue: events bpf_prog_free_deferred [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) INFO: task kworker/0:980:5598 blocked for more than 474 seconds. r4:85789800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r5:00001000 r4:eb35d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:851443c0 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:981:5600 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:981 state:D stack:0 pid:5600 tgid:5600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec605d84 r8:00000002 r7:60000013 r6:ec605d8c r5:85786c00 r4:85786c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85786c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85144c00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85786c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575738c r4:85757000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575738c r4:856e6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85786c00 r8:856e65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6580 r8:8027f5e8 r7:ec601e60 r6:856ed680 r5:85786c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec605fb0 to 0xec605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85144940 INFO: task kworker/0:981:5600 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Call trace: r5:85790000 r4:8291892c [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856e6600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:983:5604 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:983 state:D stack:0 pid:5604 tgid:5604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec615d84 r8:00000002 r7:60000013 r6:ec615d8c r5:85791800 r4:85791800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85791800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85144d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85791800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb563000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575778c r4:85757400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575778c r4:856e6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85791800 r8:856e66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6680 r8:8027f5e8 r7:ec60de60 r6:856ed780 r5:85791800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 INFO: task kworker/0:984:5605 blocked for more than 474 seconds. r4:85792400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 r5:00001000 r4:eb677000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856e6700 r8:8027f5e8 r7:ec60de60 r6:856ed800 r5:85792400 r4:85144b00 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:985:5607 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:985 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec539d84 r8:00000002 r7:60000113 r6:ec539d8c r5:8576ec00 r4:8576ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8576ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec539e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85144fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb699000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85757f8c r4:85757c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85757f8c r4:856e6780 r10:61c88647 r9:8576ec00 r8:856e67ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85144c80 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8576e000 r4:8291892c [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:987:5611 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:987 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec5cdd84 r8:00000002 r7:60000113 r6:ec5cdd8c r5:856be000 r4:856be000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856be000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850db0c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856be000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575878c r4:85758400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 r4:84b6e700 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb723000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:850db200 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:84ab1b8c r4:84ab1800 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:989:5616 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:5616 tgid:5616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:84978c00 r4:84978c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84978c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850db640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84978c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575938c r4:85759000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575938c r4:856e6b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84978c00 r8:856e6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6b80 r8:8027f5e8 r7:ec625e60 r6:856e6c00 r5:84978c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 5fa0: 00000000 00000000 00000000 00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8575978c r4:85759400 r10:61c88647 r9:84979800 r8:856e6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856e6c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856e6c80 r8:8027f5e8 r7:ec62de60 r6:856e6d00 r5:84979800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850db4c0 INFO: task kworker/0:990:5618 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e5c23000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:991 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850db980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0545d28 to 0xe0545d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:5622 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec639d84 r8:00000002 r7:60000113 r6:ec639d8c r5:8497b000 r4:8497b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8497b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dbb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8497b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85759f8c r4:85759c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85759f8c r4:856e6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:856e6e80 r8:8027f5e8 r7:ec635e60 r6:856e6f00 r5:8497b000 r4:850db800 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8497bc00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:994:5626 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:994 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec641d84 r8:00000002 r7:60000013 r6:ec641d8c r5:8497c800 r4:8497c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8497c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b380 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8497c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb953000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575b38c r4:8575b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575b38c r4:85143080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497c800 r8:851430ac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850dbac0 INFO: task kworker/0:994:5626 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e625d000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0545dc0 r5:00001000 r4:e038d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 r10:82918930 r9:ec645d84 r8:00000002 r7:60000013 r6:ec645d8c r5:8497d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dbdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8497d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575a78c r4:8575a400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575a78c r4:85143180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497d400 r8:851431ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85143180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85143180 r8:8027f5e8 r7:ec641e60 r6:85143200 r5:8497d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:996:5630 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:996 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec629d84 r8:00000002 r7:60000013 r6:ec629d8c r5:8497ec00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8497ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 9fa0: 00000000 00000000 00000000 00000000 r4:850dbd40 INFO: task kworker/0:996:5630 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e699f000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 r4:e0545dc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r5:843f0000 r4:8291892c r4:00000000 r9:83018005 r8:843f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:998:5635 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:998 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec649d84 r8:00000002 r7:60000013 r6:ec649d8c r5:843f0c00 r4:843f0c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843f0c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb979000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r4:e0545dc0 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:843f1800 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511b3c0 INFO: task kworker/0:999:5637 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e717e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r7:dddced80 r6:83018000 r5:8575bf8c r4:85143680 r4:8511b4c0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e72f5000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r5:00001000 r4:e038d000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b6d780 r10:82918930 r9:ec65dd84 r8:00000002 r7:60000113 r6:ec65dd8c r5:843f3000 r5:843f3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511b940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:843f3000 r8:851437ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1002:5642 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1002 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec661d84 r8:00000002 r7:60000113 r6:ec661d8c r5:843f3c00 r4:843f3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857d878c r4:857d8400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e7707000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:1003:5645 blocked for more than 474 seconds. r5:843f4800 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511bc80 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511b9c0 INFO: task kworker/0:1003:5645 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e7707000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1004:5647 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1004 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec64dd84 r8:00000002 r7:60000013 r6:ec64dd8c r5:843f6000 r4:843f6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:843f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r10:61c88647 r9:843f6000 r8:85143aac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d8f8c r4:857d8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d8f8c r4:85143b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a0000 r8:85143bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85143b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85143b80 r8:8027f5e8 r7:ec64de60 r6:85143c00 r5:857a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511bd00 INFO: task kworker/0:1005:5649 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e80fb000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 Exception stack(0xe0545fb0 to 0xe0545ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ec671d84 r8:00000002 r7:60000013 r6:ec671d8c r5:857a1800 r4:00000000 r4:00000000 r5:00001000 r4:ec28d000 r7:dddced80 r6:83018000 r5:850e4f8c r4:85143c80 Exception stack(0xec671fb0 to 0xec671ff8) INFO: task kworker/0:1006:5651 is blocked on a mutex likely owned by task kworker/1:97:3681. 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d978c r4:857d9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d978c r4:85143d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a0c00 r8:85143dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85143d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85143d80 r8:8027f5e8 r7:ec671e60 r6:85143e00 r5:857a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511bdc0 INFO: task kworker/0:1007:5653 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e8615000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 r4:85143e80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:857d9b8c r4:857d9800 r4:85143f80 Exception stack(0xec669fb0 to 0xec669ff8) r4:850d9180 INFO: task kworker/0:1009:5657 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e8af8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1010:5659 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1010 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec67dd84 r8:00000002 r7:60000113 r6:ec67dd8c r5:857a4800 r4:857a4800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a4800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d97c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f025000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857da38c r4:857da000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857da38c r4:850e3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a4800 r8:850e30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3080 r8:8027f5e8 r7:ec679e60 r6:850e3100 r5:857a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec67dfb0 to 0xec67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850d94c0 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:857a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r4:850e3180 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:5663 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec3fdd84 r8:00000002 r7:60000113 r6:ec3fdd8c r5:857a6000 r4:857a6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857da78c r4:857da400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857da78c r4:850e3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a6000 r8:850e32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3280 r8:8027f5e8 r7:ec3c5e60 r6:850e3300 r5:857a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3fdfb0 to 0xec3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850d95c0 INFO: task kworker/0:1012:5663 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e94e8000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1013:5665 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1013 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec591d84 r8:00000002 r7:60000113 r6:ec591d8c r5:857a6c00 r4:857a6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857db38c r4:857db000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857db38c r4:850e3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a6c00 r8:850e33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3380 r8:8027f5e8 r7:ec3c5e60 r6:850e3400 r5:857a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850d9980 INFO: task kworker/0:1013:5665 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r5:00001000 r4:e038d000 r4:84b6e700 Exception stack(0xe0545fb0 to 0xe0545ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000001 r4:850d9ac0 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e9961000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1015:5669 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1015 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec68dd84 r8:00000002 r7:60000013 r6:ec68dd8c r5:85795400 r4:85795400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85795400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d9f00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85795400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857db78c r4:857db400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857db78c r4:850e3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85795400 r8:850e352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3500 r8:8027f5e8 r7:ec591e60 r6:856ed900 r5:85795400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850d9c00 INFO: task kworker/0:1015:5669 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e9961000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:5671 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec695d84 r8:00000002 r7:60000113 r6:ec695d8c r5:85796c00 r4:85796c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85796c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec695e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85796c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e4f8c r4:857e4c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e4f8c r4:850e3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85796c00 r8:850e35ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3580 r8:8027f5e8 r7:ec68de60 r6:856ed980 r5:85796c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec695fb0 to 0xec695ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0545d28 to 0xe0545d70) r4:82ac11e4 r4:e0545dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1017:5672 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1017 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec699d84 r8:00000002 r7:60000113 r6:ec699d8c r5:85790c00 r4:85790c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85790c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d91c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85790c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1df000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbb8c r4:857db800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbb8c r4:850e3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85790c00 r8:850e362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3600 r8:8027f5e8 r7:ec695e60 r6:856eda00 r5:85790c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850d9d00 INFO: task kworker/0:1017:5672 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e9de0000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b6d780 task:kworker/0:1018 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:85794800 r4:85794800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85794800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85794800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857dbf8c r4:857dbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857dbf8c r4:850e3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85794800 r8:850e36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3680 r8:8027f5e8 r7:ec695e60 r6:856eda80 r5:85794800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85818000 INFO: task kworker/0:1018:5674 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: e9f76000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ec6add84 r8:00000002 r7:60000113 r6:ec6add8c r5:85793c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:85793c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e438c r4:857e4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e438c r4:850e3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85793c00 r8:850e372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3700 r8:8027f5e8 r7:ec695e60 r6:856edb00 r5:85793c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85818200 INFO: task kworker/0:1019:5677 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800c0113 r4:80239bb0 r4:e0545dc0 r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe0545fb0 to 0xe0545ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1020 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 r9:83018005 r8:85796000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1021:5680 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1021 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6b5d84 r8:00000002 r7:60000113 r6:ec6b5d8c r5:85786000 r4:85786000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85786000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85786000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e538c r4:857e5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e538c r4:850e3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85786000 r8:850e382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3800 r8:8027f5e8 r7:ec695e60 r6:856edc00 r5:85786000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b5fb0 to 0xec6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85818280 INFO: task kworker/0:1021:5680 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ea607000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:00001000 r4:e038d000 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1022:5685 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1022 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6bdd84 r8:00000002 r7:60000013 r6:ec6bdd8c r5:85799800 r4:85799800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85799800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85799800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e5b8c r4:857e5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e5b8c r4:850e3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85799800 r8:850e38ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3880 r8:8027f5e8 r7:ec6b5e60 r6:856edc80 r5:85799800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6bdfb0 to 0xec6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85818800 INFO: task kworker/0:1022:5685 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: eac55000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1023:5686 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1023 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:8579a400 r4:8579a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85818980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8579a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857e578c r4:857e5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857e578c r4:850e3900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579a400 r8:850e392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850e3900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e3900 r8:8027f5e8 r7:ec6bde60 r6:856edd00 r5:8579a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85818800 INFO: task kworker/0:1023:5686 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: eac55000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:5691 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec6a9d84 r8:00000002 r7:60000113 r6:ec6a9d8c r5:8579b000 r4:8579b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579b000 r4:8291892c [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec323000 r5:857e678c r4:857e6400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xec6a9fb0 to 0xec6a9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: eaf6e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:5695 blocked for more than 475 seconds. r4:8579c800 r4:00000000 r4:00000000 r5:850e5f8c r4:850e5c00 r10:00000000 r9:856edf80 r8:8027f5e8 r7:ec32de60 r6:85821000 r5:8579c800 r4:85825480 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:255 state:D stack:0 pid:5754 tgid:5754 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85798c00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857f7f8c r4:857f7c00 r4:85821080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821080 r8:8027f5e8 r7:ec32de60 r6:85821100 r5:85798c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8584a780 INFO: task kworker/1:255:5754 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: eb375000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:5770 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec751d84 r8:00000002 r7:60000113 r6:ec751d8c r5:8579d400 r4:8579d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8579d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec751e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858acdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e678c r4:850e6400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e678c r4:85821180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8579d400 r8:858211ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821180 r8:8027f5e8 r7:ec32de60 r6:85821200 r5:8579d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec751fb0 to 0xec751ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:5861 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec765d84 r8:00000002 r7:60000113 r6:ec765d8c r5:857a9800 r4:857a9800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a9800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85393d80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850e6f8c r4:850e6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850e6f8c r4:85821280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a9800 r8:858212ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821280 r8:8027f5e8 r7:ec32de60 r6:85821300 r5:857a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec765fb0 to 0xec765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858acf00 INFO: task kworker/1:257:5861 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: eb802000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:5895 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:5895 tgid:5895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9add84 r8:00000002 r7:60000013 r6:ec9add8c r5:857aa400 r4:857aa400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857aa400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec56d000 r5:8488678c r4:84886400 r4:85821380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85393f00 Workqueue: events bpf_prog_free_deferred r4:00000000 5d20: eb802000 ec8e7000 00000001 80239b98 7f1e5000 00000001 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:6096 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:6096 tgid:6096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:857aec00 r4:857aec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857aec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856db880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f31b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec607000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488638c r4:84886000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488638c r4:85821480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857aec00 r8:858214ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821480 r8:8027f5e8 r7:ec9ade60 r6:85821500 r5:857aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856db480 INFO: task kworker/1:259:6096 is blocked on a mutex likely owned by task kworker/1:97:3681. task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ebc8e000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b6e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:6099 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeccbdfb0 to 0xeccbdff8) task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84ab1b8c r4:84ab1800 r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b6d780 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:6100 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccc1d84 r8:00000002 r7:60000113 r6:eccc1d8c r5:8497e000 r4:8497e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8497e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dbb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec851000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8488578c r4:84885400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488578c r4:85821680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497e000 r8:858216ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821680 r8:8027f5e8 r7:eccbde60 r6:850e3a80 r5:8497e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 800c0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 r5:8488538c r4:84885000 task:kworker/1:97 state:R running task stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0545d28 to 0xe0545d70) 5d20: ec2c3000 ec8e7000 00000001 80239b98 7f1e5000 00000001 5d40: 82ac05a0 7f1e5000 ec8e7000 8280c930 82ac11c4 e0545da4 e0545da8 e0545d78 5d60: 80230ad4 80239bb0 800c0113 ffffffff r5:800c0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 r4:e0545dc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6db40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e038d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ab1b8c r4:84ab1800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ab1b8c r4:84b6e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be8000 r8:84b6e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 Exception stack(0xe0545fb0 to 0xe0545ff8) r4:84b6d780 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd5e08 r5:00001000 r4:ec8a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be8000 r8:80200be4 r7:e0545d5c r6:ffffffff r5:84be8000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0545dc0 r5:e0545e08 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b6e700 r8:8027f5e8 r7:dfc71e60 r6:84b6e780 r5:84be8000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:eccddd84 r8:00000002 r7:60000113 r6:eccddd8c r5:857b2400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857b3c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84134240 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e7f8c r4:844e7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e7f8c r4:85821880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b3c00 r8:858218ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821880 r8:8027f5e8 r7:eccd5e60 r6:850e3c80 r5:857b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce5fb0 to 0xecce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dbc00 INFO: task kworker/1:265:6109 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:6110 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:6110 tgid:6110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:857ab000 r4:857ab000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ab000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 r5:00001000 r4:ec8df000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514bf80 r5:00001000 r4:ec965000 r5:8488438c r4:84884000 r7:ddde2d80 r6:83018200 r5:8488438c r4:85821a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ad400 r8:85821a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821a00 r8:8027f5e8 r7:ecce5e60 r6:85821a80 r5:857ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514bd40 INFO: task kworker/1:267:6113 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:6115 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccedd84 r8:00000002 r7:60000013 r6:eccedd8c r5:857abc00 r4:857abc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857abc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccede08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f32d000 r5:00001000 r4:ec9b5000 r5:844e7b8c r4:844e7800 r7:ddde2d80 r6:83018200 r5:844e7b8c r4:85821b00 r10:00000000 r9:85821b00 r8:8027f5e8 r7:ecce5e60 r6:85821b80 r5:857abc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:6117 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccf1d84 r8:00000002 r7:60000013 r6:eccf1d8c r5:857a8c00 r4:857a8c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857a8c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e778c r4:844e7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844e778c r4:85821c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a8c00 r8:85821c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821c00 r8:8027f5e8 r7:eccede60 r6:85821c80 r5:857a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856dbfc0 INFO: task kworker/1:269:6117 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccf5d84 r8:00000002 r7:60000013 r6:eccf5d8c r5:857ae000 r4:857ae000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857ae000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f331000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca3b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a438c r4:856a4000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a438c r4:85821d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ae000 r8:85821d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:e055ddc0 r5:00001000 r4:e03a5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca5d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a478c r4:856a4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a478c r4:85821e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ac800 r8:85821e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85821e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85821e00 r8:8027f5e8 r7:eccf5e60 r6:85821e80 r5:857ac800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ecd05d84 r8:00000002 r7:60000013 r6:ecd05d8c r5:8579e000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eca77000 r7:ddde2d80 r6:83018200 r5:856a4b8c r4:85821f00 Exception stack(0xecd05fb0 to 0xecd05ff8) Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 900f0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:6125 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:6125 tgid:6125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd09d84 r8:00000002 r7:60000013 r6:ecd09d8c r5:84498000 r4:84498000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84498000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca97000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r4:84b6b700 r4:84b66900 r4:84499800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5bc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84499800 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a538c r4:856a5000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a538c r4:84b84100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84499800 r8:84b8412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84100 r8:8027f5e8 r7:ecd09e60 r6:84b84180 r5:84499800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd0dfb0 to 0xecd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc5240 INFO: task kworker/1:274:6127 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 r5:900f0113 r4:80239bb0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecb83000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:84b16b8c r4:84b16800 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc5980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8449b000 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5f8c r4:856a5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a5f8c r4:84b84300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449b000 r8:84b8432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84300 r8:8027f5e8 r7:ecd11e60 r6:84b84380 r5:8449b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc5b40 INFO: task kworker/1:276:6132 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:6134 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd15d84 r8:00000002 r7:60000113 r6:ecd15d8c r5:8449bc00 r4:8449bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb9d000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:6136 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:6136 tgid:6136 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82918930 r9:ecd19d84 r8:00000002 r7:60000013 r6:ecd19d8c r5:8449c800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc4b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6f8c r4:856a6c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a6f8c r4:84b84500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449c800 r8:84b8452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84500 r8:8027f5e8 r7:eccc5e60 r6:84b84580 r5:8449c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bc5e00 INFO: task kworker/1:278:6136 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bac1c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8449d400 r7:00000000 r6:83018200 r5:00001000 r4:7f343000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a638c r4:856a6000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a638c r4:84b84600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449d400 r8:84b8462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84600 r8:8027f5e8 r7:ecd19e60 r6:84b84680 r5:8449d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd21fb0 to 0xecd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 900f0113 ffffffff [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:6140 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:6140 tgid:6140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd1dd84 r8:00000002 r7:60000013 r6:ecd1dd8c r5:8449e000 r4:8449e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc29000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8449e000 r8:84b8472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:857b4800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecc37000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856a6b8c r4:84b84800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b4800 r8:84b8482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84800 r8:8027f5e8 r7:ecd19e60 r6:850e3d00 r5:857b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bac180 INFO: task kworker/1:281:6142 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r5:00001000 r4:ecd59000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858f878c r4:858f8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f878c r4:84b84880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b1800 r8:84b848ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84880 r8:8027f5e8 r7:ecd19e60 r6:850e3d80 r5:857b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bac200 INFO: task kworker/1:282:6144 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:6145 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8449ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b84900 Exception stack(0xecd2dfb0 to 0xecd2dff8) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:284:6148 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:6148 tgid:6148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd35d84 r8:00000002 r7:60000113 r6:ecd35d8c r5:8449a400 r4:8449a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8449a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bac880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8449a400 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc67000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a778c r4:856a7400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856a778c r4:84b84a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8449a400 r8:84b84a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84a00 r8:8027f5e8 r7:ecd39e60 r6:84b84a80 r5:8449a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd35fb0 to 0xecd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:285:6149 blocked for more than 475 seconds. r10:82918930 r9:ecd25d84 r8:00000002 r7:60000013 r6:ecd25d8c r5:8579ec00 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecc7b000 r5:856a7b8c r4:856a7800 r10:61c88647 r9:8579ec00 r8:84b84b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bac700 INFO: task kworker/1:285:6149 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:6152 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd41d84 r8:00000002 r7:60000013 r6:ecd41d8c r5:857c8000 r4:857c8000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857c8000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bacb80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc89000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a7f8c r4:856a7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd41fb0 to 0xecd41ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ecd51d84 r8:00000002 r7:60000013 r6:ecd51d8c r5:857c9800 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecd4d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd51fb0 to 0xecd51ff8) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:6156 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd65d84 r8:00000002 r7:60000113 r6:ecd65d8c r5:857cb000 r4:857cb000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857cb000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f3cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fbf8c r4:858fbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fbf8c r4:84b84e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857cb000 r8:84b84e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b84e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b84e00 r8:8027f5e8 r7:ecd39e60 r6:84b84e80 r5:857cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:289 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece8d000 r5:858fb78c r4:858fb400 r10:61c88647 r9:857cbc00 r8:84b84f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855851c0 INFO: task kworker/1:289:6164 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 7fda6000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:290:6266 blocked for more than 475 seconds. r4:857c8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece99000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85663000 r8:8027f5e8 r7:ecd65e60 r6:85663080 r5:857c8c00 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f3d3000 r5:8424d38c r4:8424d000 r10:61c88647 r9:857cd400 r8:8566312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85672740 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:6270 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:6270 tgid:6270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eceb9d84 r8:00000002 r7:60000013 r6:eceb9d8c r5:857b6000 r4:857b6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f3d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85933f8c r4:85933c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85933f8c r4:85663200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b6000 r8:8566322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663200 r8:8027f5e8 r7:ece9de60 r6:850e3e00 r5:857b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85672740 INFO: task kworker/1:292:6270 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:6273 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:6273 tgid:6273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eced5d84 r8:00000002 r7:60000113 r6:eced5d8c r5:857b3000 r4:857b3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857b3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ececd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeced5fb0 to 0xeced5ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ecee1d84 r8:00000002 r7:60000013 r6:ecee1d8c r5:857b5400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecef1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85663300 r8:8027f5e8 r7:eced5e60 r6:850e3f00 r5:857b5400 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 task:kworker/1:295 state:D stack:0 pid:6276 tgid:6276 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f3d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecedd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424df8c r4:8424dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424df8c r4:85663380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b6c00 r8:856633ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663380 r8:8027f5e8 r7:ecee1e60 r6:850e3f80 r5:857b6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee9fb0 to 0xecee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85672b80 INFO: task kworker/1:295:6276 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:296 state:D stack:0 pid:6278 tgid:6278 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ecf0d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424cb8c r4:85663400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843f6c00 r8:8566342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663400 r8:8027f5e8 r7:ecee1e60 r6:85689000 r5:843f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85672d40 INFO: task kworker/1:296:6278 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b66900 r4:857cc800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecf01000 r5:8424cf8c r4:8424cc00 r10:61c88647 r9:857cc800 r8:856634ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663480 r8:8027f5e8 r7:ecef9e60 r6:85663500 r5:857cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb5fb0 to 0xeceb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8417fec0 INFO: task kworker/1:297:6281 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:82ac11e4 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ca400 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecf19000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424c78c r4:8424c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424c78c r4:85663580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ca400 r8:856635ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3e3000 r5:00001000 r4:ecf31000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85663680 Exception stack(0xece45fb0 to 0xece45ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-syzkaller #0 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf25000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424c38c r4:8424c000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424c38c r4:85663780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ce000 r8:856637ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663780 r8:8027f5e8 r7:ece45e60 r6:85663800 r5:857ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf1dfb0 to 0xecf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf35e08 r5:00001000 r4:ecf3d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:848efb8c r4:848ef800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848efb8c r4:85663880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857a3000 r8:856638ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663880 r8:8027f5e8 r7:ece45e60 r6:85663900 r5:857a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf35fb0 to 0xecf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679200 INFO: task kworker/1:301:6289 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85438000 r7:00000000 r6:83018200 r5:00001000 r4:7f3e9000 r5:00001000 r4:ecf55000 r5:8590438c r4:85904000 r10:61c88647 r9:85438000 r8:856639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6b700 Exception stack(0xe055dfb0 to 0xe055dff8) INFO: task kworker/1:303:6294 blocked for more than 475 seconds. r4:85438c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf4de08 r5:00001000 r4:ecf49000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85663a80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:6295 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:6295 tgid:6295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf59d84 r8:00000002 r7:60000013 r6:ecf59d8c r5:85439800 r4:85439800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85439800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679a00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85439800 r7:00000000 r6:83018200 r5:00001000 r4:7f3ed000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590478c r4:85904400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590478c r4:85663b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85439800 r8:85663bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663b80 r8:8027f5e8 r7:ecf41e60 r6:85663c00 r5:85439800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf59fb0 to 0xecf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679500 INFO: task kworker/1:304:6295 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:8543a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf65e08 r5:00001000 r4:ecf75000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85904b8c r4:85904800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85904b8c r4:85663c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543a400 r8:85663cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663c80 r8:8027f5e8 r7:ecf59e60 r6:85663d00 r5:8543a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf65fb0 to 0xecf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679880 INFO: task kworker/1:305:6298 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8543b000 r4:00000000 r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f451000 r5:00001000 r4:ec611000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecf79fb0 to 0xecf79ff8) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf29d84 r8:00000002 r7:60000113 r6:ecf29d8c r5:8543bc00 r4:8543bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf29e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85679c80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f3af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85904f8c r4:85904c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85904f8c r4:85663e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543bc00 r8:85663eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85663e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85663e80 r8:8027f5e8 r7:ecf79e60 r6:85663f00 r5:8543bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf29fb0 to 0xecf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85679b00 INFO: task kworker/1:307:6304 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r10:82918930 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:8543c800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecbf5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8590538c r4:85905000 r10:61c88647 r9:8543c800 r8:85663fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:6320 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:6320 tgid:6320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecf85d84 r8:00000002 r7:60000113 r6:ecf85d8c r5:8543ec00 r4:8543ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf85e08 r4:00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4ef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecf85fb0 to 0xecf85ff8) r4:856e4300 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/1:310:6383 blocked for more than 475 seconds. r4:85851800 r4:00000000 r9:83018205 r8:85851800 r7:00000000 r6:83018200 r5:00001000 r4:7f44f000 r5:8590678c r4:85906400 r10:61c88647 r9:85851800 r8:8513b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:6386 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:6386 tgid:6386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed069d84 r8:00000002 r7:60000113 r6:ed069d8c r5:85852400 r4:85852400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85852400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed069e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597a600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85852400 r7:00000000 r6:83018200 r5:00001000 r4:7f455000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca39000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8590738c r4:85907000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590738c r4:8513b280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85852400 r8:8513b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513b280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513b280 r8:8027f5e8 r7:ecf79e60 r6:8513b300 r5:85852400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed069fb0 to 0xed069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597a180 INFO: task kworker/1:311:6386 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:6387 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:6387 tgid:6387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85906f8c r4:85906c00 r10:61c88647 r9:85853000 r8:8513b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:6390 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed071d84 r8:00000002 r7:60000113 r6:ed071d8c r5:85853c00 r4:85853c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85853c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed071e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597a780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85853c00 r7:00000000 r6:83018200 r5:00001000 r4:7f457000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85853c00 r8:8513b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597aac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85854800 r7:00000000 r6:83018200 r5:00001000 r4:7f45b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb99000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85907f8c r4:85907c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85907f8c r4:8513b580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85854800 r8:8513b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513b580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513b580 r8:8027f5e8 r7:ed071e60 r6:8513b600 r5:85854800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed079fb0 to 0xed079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597a400 INFO: task kworker/1:314:6392 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r4:84b6b700 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ed075d84 r8:00000002 r7:60000013 r6:ed075d8c r5:85855400 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecb67000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecc15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8424eb8c r4:8424e800 r10:61c88647 r9:85856000 r8:8513b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8597a940 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:82ac11e4 r4:e055ddc0 r5:00001000 r4:e03a5000 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85850c00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc35000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b6b700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:6400 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed089d84 r8:00000002 r7:60000113 r6:ed089d8c r5:8543d400 r4:8543d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed089e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597afc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f461000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc63000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424e38c r4:8424e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424e38c r4:8513b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543d400 r8:8513b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513b980 r8:8027f5e8 r7:ed081e60 r6:8513ba00 r5:8543d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed089fb0 to 0xed089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597ac80 INFO: task kworker/1:318:6400 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f465000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8597ae80 INFO: task kworker/1:319:6402 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:6403 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:6403 tgid:6403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed091d84 r8:00000002 r7:60000113 r6:ed091d8c r5:8544ec00 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc83000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8544ec00 r8:8513bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:6406 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:6406 tgid:6406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed099d84 r8:00000002 r7:60000113 r6:ed099d8c r5:85448c00 r4:85448c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85448c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed099e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566a2c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f467000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85914b8c r4:85914800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85914b8c r4:8513bb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85448c00 r8:8513bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513bb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513bb80 r8:8027f5e8 r7:ed08de60 r6:85689180 r5:85448c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed099fb0 to 0xed099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566a080 INFO: task kworker/1:321:6406 is blocked on a mutex likely owned by task kworker/0:191:3684. r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:82ac11e4 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:322:6408 blocked for more than 476 seconds. r4:8544e000 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:6409 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0a5d84 r8:00000002 r7:60000113 r6:ed0a5d8c r5:8544c800 r4:8544c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566a440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd57000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed0a5fb0 to 0xed0a5ff8) r4:8566a140 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r4:84b6b700 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ecea1000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f46d000 r5:8591578c r4:85915400 r10:61c88647 r9:85448000 r8:8513bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566a3c0 INFO: task kworker/1:325:6413 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:6415 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:6415 tgid:6415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0bdd84 r8:00000002 r7:60000113 r6:ed0bdd8c r5:8544a400 r4:8544a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566a800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f46f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85915b8c r4:85915800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85915b8c r4:8513be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544a400 r8:8513be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513be00 r8:8027f5e8 r7:ed0ade60 r6:85689400 r5:8544a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0bdfb0 to 0xed0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566a4c0 INFO: task kworker/1:326:6415 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:6417 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:6417 tgid:6417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0c5d84 r8:00000002 r7:60000113 r6:ed0c5d8c r5:8544b000 r4:8544b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566a940 r4:00000000 r9:83018205 r8:8544b000 r7:00000000 r6:83018200 r5:00001000 r4:7f471000 r5:00001000 r4:ecdf9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85915f8c r4:8513be80 r10:61c88647 r9:8544b000 r8:8513beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed0c5fb0 to 0xed0c5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566a680 INFO: task kworker/1:327:6417 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:6419 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:6419 tgid:6419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0cdd84 r8:00000002 r7:60000113 r6:ed0cdd8c r5:85449800 r4:85449800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85449800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566aa80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ece1d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85449800 r8:8513bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8513bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513bf00 r8:8027f5e8 r7:ed0ade60 r6:85689500 r5:85449800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0cdfb0 to 0xed0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566a7c0 INFO: task kworker/1:328:6419 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece5b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8591678c r4:85916400 r10:61c88647 r9:85518c00 r8:8513bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e055ddc0 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85916b8c r4:8567d000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 r4:00000000 r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:6427 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:6427 tgid:6427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0d9d84 r8:00000002 r7:60000113 r6:ed0d9d8c r5:85850000 r4:85850000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85850000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ae40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85850000 r7:00000000 r6:83018200 r5:00001000 r4:7f479000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece8b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85916f8c r4:85916c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85916f8c r4:8567d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850000 r8:8567d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567d100 r8:8027f5e8 r7:ed0ade60 r6:8567d180 r5:85850000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0d9fb0 to 0xed0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566acc0 INFO: task kworker/1:331:6427 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed095e08 r5:00001000 r4:eced7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85917b8c r4:8567d200 r10:00000000 r9:8567d200 r8:8027f5e8 r7:ed0ade60 r6:8567d280 r5:8543e000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:333 state:D stack:0 pid:6431 tgid:6431 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:8591778c r4:85917400 r4:8567d300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:6432 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:6432 tgid:6432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0e5d84 r8:00000002 r7:60000013 r6:ed0e5d8c r5:85858c00 r4:85858c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85858c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210500 r4:00000000 r5:00001000 r4:ecefb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8591838c r4:8567d400 Exception stack(0xed0e5fb0 to 0xed0e5ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b16b8c r4:84b16800 r4:84b6b700 dfa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0ede08 r5:00001000 r4:eceeb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85859800 r8:8567d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:6436 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:6436 tgid:6436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed0f1d84 r8:00000002 r7:60000013 r6:ed0f1d8c r5:8585a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecf13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8585a400 r8:8567d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85210440 Call trace: dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852107c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8585b000 r7:00000000 r6:83018200 r5:00001000 r4:7f487000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85918b8c r4:85918800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85918b8c r4:8567d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585b000 r8:8567d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567d700 r8:8027f5e8 r7:ed0f1e60 r6:8567d780 r5:8585b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85210480 INFO: task kworker/1:337:6438 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:e055ddc0 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210980 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82918930 r9:ed0fdd84 r8:00000002 r7:60000113 r6:ed0fdd8c r5:8585c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0fde08 r5:00001000 r4:ecf51000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xed0fdfb0 to 0xed0fdff8) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:00000000 r5:84b16b8c r4:84b16800 r4:84b6b700 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8585d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8585d400 r7:00000000 r6:83018200 r5:00001000 r4:7f447000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591978c r4:85919400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591978c r4:8567da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585d400 r8:8567da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567da00 r8:8027f5e8 r7:ed0fde60 r6:8567da80 r5:8585d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85210c00 INFO: task kworker/1:340:6448 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:6449 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:6449 tgid:6449 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85860000 r7:00000000 r6:83018200 r5:00001000 r4:7f591000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424fb8c r4:8424f800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424fb8c r4:8567db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85860000 r8:8567db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eccfb000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85919f8c r4:85919c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85919f8c r4:8567dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85860c00 r8:8567dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8567dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567dc00 r8:8027f5e8 r7:ed115e60 r6:8567dc80 r5:85860c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed119fb0 to 0xed119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85210c00 INFO: task kworker/1:342:6451 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 80394000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed2cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8591a38c r4:8567dd00 Exception stack(0xed101fb0 to 0xed101ff8) Workqueue: events bpf_prog_free_deferred dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:6540 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:6540 tgid:6540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed2a5d84 r8:00000002 r7:60000113 r6:ed2a5d8c r5:85866c00 r4:85866c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85866c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546cec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85866c00 r7:00000000 r6:83018200 r5:00001000 r4:7f529000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591ab8c r4:8591a800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591ab8c r4:8567de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85866c00 r8:8567de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018205 r8:85861800 r7:00000000 r6:83018200 r5:00001000 r4:7f52b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r4:00000000 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:6570 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:6570 tgid:6570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec785d84 r8:00000002 r7:60000113 r6:ec785d8c r5:85865400 r4:85865400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85865400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85865400 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591b78c r4:8591b400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591b78c r4:859a0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85865400 r8:859a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0000 r8:8027f5e8 r7:ed115e60 r6:859a0080 r5:85865400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853c2040 INFO: task kworker/1:346:6570 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:347 state:D stack:0 pid:6615 tgid:6615 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ecaef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8591bb8c r4:8591b800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591bb8c r4:859a0100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85864800 r8:859a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0100 r8:8027f5e8 r7:ed115e60 r6:859a0180 r5:85864800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a87180 INFO: task kworker/1:347:6615 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:84b66900 task:kworker/1:348 state:D stack:0 pid:6626 tgid:6626 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ec73d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a33f8c r4:859a0200 Exception stack(0xec7a1fb0 to 0xec7a1ff8) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:6629 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:6629 tgid:6629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec829d84 r8:00000002 r7:60000013 r6:ec829d8c r5:85866000 r4:85866000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85866000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ab40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85866000 r7:00000000 r6:83018200 r5:00001000 r4:7f5b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb23000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:6631 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:6631 tgid:6631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecaf9d84 r8:00000002 r7:60000113 r6:ecaf9d8c r5:85862400 r4:85862400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85862400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a1180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85862400 r7:00000000 r6:83018200 r5:00001000 r4:7f5af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec839000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424f38c r4:8424f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424f38c r4:859a0400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85862400 r8:859a042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0400 r8:8027f5e8 r7:ec829e60 r6:859a0480 r5:85862400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a87c40 INFO: task kworker/1:350:6631 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:83fc1800 r7:00000000 r6:83018200 r5:00001000 r4:7f5b1000 r5:00001000 r4:ecb0b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8424ef8c r4:8424ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8424ef8c r4:859a0500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc1800 r8:859a052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0500 r8:8027f5e8 r7:ec829e60 r6:859a0580 r5:83fc1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98200 INFO: task kworker/1:351:6648 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:00000000 r5:00001000 r4:e03a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:352:6649 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:6649 tgid:6649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:83fc0000 r4:83fc0000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc0000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83fc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f5b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb13000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592438c r4:85924000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592438c r4:859a0600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc0000 r8:859a062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0600 r8:8027f5e8 r7:ec829e60 r6:859a0680 r5:83fc0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98080 INFO: task kworker/1:352:6649 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 r4:82ac11e4 r4:e055ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b66900 INFO: task kworker/1:353:6651 blocked for more than 476 seconds. Call trace: r4:83fc0c00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:83fc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb75000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a38b8c r4:85a38800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a38b8c r4:859a0700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc0c00 r8:859a072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0700 r8:8027f5e8 r7:ec829e60 r6:859a0780 r5:83fc0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98040 INFO: task kworker/1:353:6651 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:6658 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:6658 tgid:6658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:83fc3c00 r4:83fc3c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc3c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83fc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85924f8c r4:85924c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85924f8c r4:859a0800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc3c00 r8:859a082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859a0800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859a0800 r8:8027f5e8 r7:ecb35e60 r6:859a0880 r5:83fc3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98740 INFO: task kworker/1:354:6658 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba9e08 r9:83018205 r8:83fc4800 r7:00000000 r6:83018200 r5:00001000 r4:7f5c7000 r5:00001000 r4:ec8b9000 r7:ddde2d80 r6:83018200 r5:85924b8c r4:859a0900 r10:00000000 r9:859a0900 r8:8027f5e8 r7:ecb89e60 r6:859a0980 r5:83fc4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98a80 INFO: task kworker/1:355:6660 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:6670 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:6670 tgid:6670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb05d84 r8:00000002 r7:60000113 r6:ecb05d8c r5:83fc2400 r4:83fc2400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc2400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec93d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8592578c r4:859a0a00 Exception stack(0xecb05fb0 to 0xecb05ff8) r4:85a98dc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:6671 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:6671 tgid:6671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:83fc5400 r4:83fc5400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc5400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a98a40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83fc5400 r7:00000000 r6:83018200 r5:00001000 r4:7f5cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec909000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592538c r4:85925000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592538c r4:859a0b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:859a0b00 Exception stack(0xecba5fb0 to 0xecba5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:6674 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:6674 tgid:6674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec931d84 r8:00000002 r7:60000113 r6:ec931d8c r5:83fc6000 r4:83fc6000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc6000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a87f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83fc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f5d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec951000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85925b8c r4:85925800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85925b8c r4:859a0c00 r10:61c88647 r9:83fc6000 r8:859a0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a98840 INFO: task kworker/1:358:6674 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:6675 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:6675 tgid:6675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:83fc6c00 r4:83fc6c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc6c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a89140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83fc6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85925f8c r4:85925c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85925f8c r4:859a0d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83fc6c00 r8:859a0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:85a873c0 Call trace: dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:6677 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:6677 tgid:6677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:83fc3000 r4:83fc3000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83fc3000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r5:00001000 r4:ec9d1000 r5:8592638c r4:85926000 r4:00000001 r4:85a89080 Exception stack(0xe055dd28 to 0xe055dd70) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b66900 r4:8585ec00 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a89700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8585ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f5e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85926b8c r4:85926800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85926b8c r4:859a0f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585ec00 r8:859a0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:859a0f00 r8:8027f5e8 r7:eca09e60 r6:859a0f80 r5:8585ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a891c0 INFO: task kworker/1:361:6684 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e055ddc0 r5:84b16b8c r4:84b16800 r4:00000001 INFO: task kworker/1:362:6685 blocked for more than 476 seconds. [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec9ed000 r10:61c88647 r9:8585e000 r8:85a8302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r10:82918930 r9:ecae5d84 r8:00000002 r7:60000113 r6:ecae5d8c r5:85868c00 r5:00001000 r4:eca01000 r7:ddde2d80 r6:83018200 r5:85926f8c r4:85a83100 r4:85a89500 Exception stack(0xe055dd28 to 0xe055dd70) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:84b6b700 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 r5:8592738c r4:85927000 Exception stack(0xecbb9fb0 to 0xecbb9ff8) Exception stack(0xe055dd28 to 0xe055dd70) r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:6693 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:6693 tgid:6693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbbdd84 r8:00000002 r7:60000113 r6:ecbbdd8c r5:8586a400 r4:8586a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a89b80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586a400 r7:00000000 r6:83018200 r5:00001000 r4:7f5e7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca35000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592778c r4:85927400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592778c r4:85a83300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586a400 r8:85a8332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83300 r8:8027f5e8 r7:ecbb9e60 r6:85a83380 r5:8586a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbbdfb0 to 0xecbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a89800 INFO: task kworker/1:365:6693 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:6696 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:6696 tgid:6696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbc1d84 r8:00000002 r7:60000113 r6:ecbc1d8c r5:8586b000 r4:8586b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:eca75000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8586b000 r8:85a8342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecbc1fb0 to 0xecbc1ff8) r4:85a89980 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:6699 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:6699 tgid:6699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecaf5d84 r8:00000002 r7:60000113 r6:ecaf5d8c r5:8586bc00 r4:8586bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:ec5dd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8487038c r4:85a83500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:82ac11e4 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 task:kworker/1:368 state:D stack:0 pid:6703 tgid:6703 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc9e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a85980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586c800 r7:00000000 r6:83018200 r5:00001000 r4:7f58f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85927f8c r4:85927c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85927f8c r4:85a83600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586c800 r8:85a8362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83600 r8:8027f5e8 r7:ecaf5e60 r6:85a83680 r5:8586c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a89b00 INFO: task kworker/1:368:6703 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e055ddc0 r5:00001000 r4:e03a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8586d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r5:00001000 r4:ec6d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8424ff8c r4:8424fc00 r4:85a83700 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:00000000 r5:00001000 r4:e03a5000 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r4:84b6b700 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:370:6722 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r5:85868000 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a85480 r5:00001000 r4:ec71f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adc78c r4:85adc400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adc78c r4:85a83800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85868000 r8:85a8382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83800 r8:8027f5e8 r7:ecb11e60 r6:85a83880 r5:85868000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a85ac0 INFO: task kworker/1:370:6722 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:6728 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:6728 tgid:6728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb4dd84 r8:00000002 r7:60000013 r6:ecb4dd8c r5:8586e000 r4:8586e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab12c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586e000 r7:00000000 r6:83018200 r5:00001000 r4:7f613000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec753000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85add38c r4:85add000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add38c r4:85a83900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586e000 r8:85a8392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83900 r8:8027f5e8 r7:ecb19e60 r6:85a83980 r5:8586e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a85fc0 INFO: task kworker/1:371:6728 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:6729 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:6729 tgid:6729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:8586ec00 r4:8586ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8586ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a85080 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f5c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec735000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcb8c r4:85adc800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcb8c r4:85a83a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8586ec00 r8:85a83a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83a00 r8:8027f5e8 r7:ecb4de60 r6:85a83a80 r5:8586ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a85340 INFO: task kworker/1:372:6729 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:6731 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:6731 tgid:6731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec7add84 r8:00000002 r7:60000113 r6:ec7add8c r5:8448a400 r4:8448a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8448a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab11c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8448a400 r7:00000000 r6:83018200 r5:00001000 r4:7f611000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec741000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adcf8c r4:85adcc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adcf8c r4:85a83b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448a400 r8:85a83b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83b00 r8:8027f5e8 r7:ecb4de60 r6:85a83b80 r5:8448a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a85540 INFO: task kworker/1:373:6731 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:6734 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:6734 tgid:6734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecbb5d84 r8:00000002 r7:60000113 r6:ecbb5d8c r5:85870000 r4:85870000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85870000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1580 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85870000 r7:00000000 r6:83018200 r5:00001000 r4:7f617000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85addb8c r4:85add800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addb8c r4:85a83c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85870000 r8:85a83c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83c00 r8:8027f5e8 r7:ecb4de60 r6:85a83c80 r5:85870000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab10c0 INFO: task kworker/1:374:6734 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:6737 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:6737 tgid:6737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd75d84 r8:00000002 r7:60000013 r6:ecd75d8c r5:85870c00 r4:85870c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85870c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd75e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85870c00 r7:00000000 r6:83018200 r5:00001000 r4:7f615000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec767000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85add78c r4:85add400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85add78c r4:85a83d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85870c00 r8:85a83d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83d00 r8:8027f5e8 r7:ecbb5e60 r6:85a83d80 r5:85870c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd75fb0 to 0xecd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab1280 INFO: task kworker/1:375:6737 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:6738 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:6738 tgid:6738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd7dd84 r8:00000002 r7:60000013 r6:ecd7dd8c r5:85871800 r4:85871800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85871800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd7de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab19c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85871800 r7:00000000 r6:83018200 r5:00001000 r4:7f61d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ade38c r4:85ade000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ade38c r4:85a83e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85871800 r8:85a83e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83e00 r8:8027f5e8 r7:ecbb5e60 r6:85a83e80 r5:85871800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab1380 INFO: task kworker/1:376:6738 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:6739 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85518000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518000 r7:00000000 r6:83018200 r5:00001000 r4:7f619000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85addf8c r4:85addc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85addf8c r4:85a83f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85518000 r8:85a83f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a83f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a83f00 r8:8027f5e8 r7:ecd7de60 r6:85689600 r5:85518000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd89fb0 to 0xecd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab1380 INFO: task kworker/1:377:6739 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b6b700 r4:00000001 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ecd49d84 r8:00000002 r7:60000013 r6:ecd49d8c r5:85519800 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec803000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85ade78c r4:85a83f80 r10:00000000 r9:85a83f80 r8:8027f5e8 r7:ecd7de60 r6:85689680 r5:85519800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:6745 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:6745 tgid:6745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecd8dd84 r8:00000002 r7:60000013 r6:ecd8dd8c r5:8551a400 r4:8551a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd8de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1d00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551a400 r7:00000000 r6:83018200 r5:00001000 r4:7f623000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adeb8c r4:85ade800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adeb8c r4:8442e300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551a400 r8:8442e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8442e300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8442e300 r8:8027f5e8 r7:ecd49e60 r6:85689700 r5:8551a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd8dfb0 to 0xecd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab17c0 INFO: task kworker/1:379:6745 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:6748 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:6748 tgid:6748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecda1d84 r8:00000002 r7:60000113 r6:ecda1d8c r5:8551e000 r4:8551e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85adef8c r4:8442e280 r4:8442e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8442e280 r8:8027f5e8 r7:ecd8de60 r6:85689780 r5:8551e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda1fb0 to 0xecda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab1940 INFO: task kworker/1:380:6748 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:381 state:D stack:0 pid:6750 tgid:6750 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8551d400 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1f80 r5:00001000 r4:ecb0d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85aa6000 Exception stack(0xecda5fb0 to 0xecda5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:6752 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:6752 tgid:6752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdadd84 r8:00000002 r7:60000113 r6:ecdadd8c r5:8551c800 r4:8551c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84132300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551c800 r7:00000000 r6:83018200 r5:00001000 r4:7f629000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb29000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adf78c r4:85adf400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adf78c r4:85aa6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551c800 r8:85aa60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6080 r8:8027f5e8 r7:ecda5e60 r6:85689880 r5:8551c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdadfb0 to 0xecdadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab1e00 INFO: task kworker/1:382:6752 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:6754 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:6754 tgid:6754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdb9d84 r8:00000002 r7:60000013 r6:ecdb9d8c r5:8551ec00 r4:8551ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aab0c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f62b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb55000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85adfb8c r4:85adf800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85adfb8c r4:85aa6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:85aa612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6100 r8:8027f5e8 r7:ecdade60 r6:85689900 r5:8551ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb9fb0 to 0xecdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82918930 r9:ecdbdd84 r8:00000002 r7:60000013 r6:ecdbdd8c r5:8551b000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85adff8c r4:85adfc00 r4:85aa6180 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecbaf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ae438c r4:85ae4000 r10:61c88647 r9:8551bc00 r8:85aa622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfd43000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:843f5400 r8:85aa62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:6762 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:6762 tgid:6762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece15d84 r8:00000002 r7:60000113 r6:ece15d8c r5:85708c00 r4:85708c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85708c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aab6c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85708c00 r7:00000000 r6:83018200 r5:00001000 r4:7f633000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd27000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae478c r4:85ae4400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae478c r4:85aa6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708c00 r8:85aa632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6300 r8:8027f5e8 r7:ecdd1e60 r6:85689b00 r5:85708c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aab3c0 INFO: task kworker/1:387:6762 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85709800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r5:00001000 r4:ec81b000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85709800 r8:85aa63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6380 r8:8027f5e8 r7:ecdd1e60 r6:85689b80 r5:85709800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aab5c0 INFO: task kworker/1:388:6765 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe055dfb0 to 0xe055dff8) Not tainted 6.15.0-syzkaller #0 r4:8570b000 r4:00000000 r4:00000000 r5:00001000 r4:dfd9b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:82ac11e4 r4:00000000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82918930 r9:ece25d84 r8:00000002 r7:60000013 r6:ece25d8c r5:85708000 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aabac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85708000 r7:00000000 r6:83018200 r5:00001000 r4:7f5cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae578c r4:85ae5400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae578c r4:85aa6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708000 r8:85aa64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6480 r8:8027f5e8 r7:ecc05e60 r6:85689c80 r5:85708000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece25fb0 to 0xece25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aaba80 INFO: task kworker/1:390:6769 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:84b66900 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8570bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f5db000 r5:85ae678c r4:85ae6400 r10:61c88647 r9:8570bc00 r8:85aa652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8ef000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae5b8c r4:85ae5800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae5b8c r4:85aa6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85872400 r8:85aa65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6580 r8:8027f5e8 r7:ece39e60 r6:85aa6600 r5:85872400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc5fb0 to 0xecdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aab940 INFO: task kworker/1:392:6772 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 809c0000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:6775 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:6775 tgid:6775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:85873c00 r4:85873c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aabe00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae5f8c r4:85ae5c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae5f8c r4:85aa6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873c00 r8:85aa66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6680 r8:8027f5e8 r7:ece39e60 r6:85aa6700 r5:85873c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece2dfb0 to 0xece2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:6776 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:6776 tgid:6776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecdd5d84 r8:00000002 r7:60000013 r6:ecdd5d8c r5:85874800 r4:85874800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85874800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aab200 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85874800 r7:00000000 r6:83018200 r5:00001000 r4:7f5d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec92d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae638c r4:85ae6000 r7:ddde2d80 r6:83018200 r5:85ae638c r4:85aa6780 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:6780 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:6780 tgid:6780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ece49d84 r8:00000002 r7:60000013 r6:ece49d8c r5:85875400 r4:85875400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85875400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8f280 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xece49fb0 to 0xece49ff8) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:396:6781 blocked for more than 477 seconds. r4:00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85aa6980 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:397 state:D stack:0 pid:6783 tgid:6783 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec99d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85aa6a80 r8:8027f5e8 r7:ece85e60 r6:85aa6b00 r5:85876c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Workqueue: events bpf_prog_free_deferred [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85aa6b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6b80 r8:8027f5e8 r7:ece85e60 r6:85aa6c00 r5:85873000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8fc40 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf91e08 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8f940 INFO: task kworker/1:400:6789 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:401 state:D stack:0 pid:6790 tgid:6790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8fac0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b19800 r7:00000000 r6:83018200 r5:00001000 r4:7f5eb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ae7f8c r4:85ae7c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae7f8c r4:85aa6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b19800 r8:85aa6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a8fa00 Exception stack(0xe055dd28 to 0xe055dd70) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 Exception stack(0xe055dfb0 to 0xe055dff8) r10:82918930 r9:ecf95d84 r8:00000002 r7:60000113 r6:ecf95d8c r5:85b1a400 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85aa6f80 r10:00000000 r9:85aa6f80 r8:8027f5e8 r7:ecec5e60 r6:85a94000 r5:85b1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf95fb0 to 0xecf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8f940 INFO: task kworker/1:402:6793 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:403 state:D stack:0 pid:6796 tgid:6796 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a94180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94180 r8:8027f5e8 r7:ecfa9e60 r6:85a94200 r5:85b1bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf99fb0 to 0xecf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8fcc0 INFO: task kworker/1:404:6797 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb1e08 r5:00001000 r4:ecbe3000 r7:ddde2d80 r6:83018200 r5:85ae9f8c r4:85a94280 INFO: task kworker/1:405:6799 is blocked on a mutex likely owned by task kworker/0:191:3684. r4:e055ddc0 r5:84b16b8c r4:84b16800 r4:00000001 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:6800 tgid:6800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfb5d84 r8:00000002 r7:60000113 r6:ecfb5d8c r5:85b1ec00 r4:85b1ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b1ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfb5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecabd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85b1ec00 r8:85a943ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecae9000 r5:85ae978c r4:85ae9400 r4:85a94480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:84b16b8c r4:84b16800 Exception stack(0xe055dfb0 to 0xe055dff8) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d600 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:6808 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfbdd84 r8:00000002 r7:60000113 r6:ecfbdd8c r5:85878000 r4:85878000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfbde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8d900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85878000 r7:00000000 r6:83018200 r5:00001000 r4:7f647000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aea38c r4:85aea000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea38c r4:85a94680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85878000 r8:85a946ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94680 r8:8027f5e8 r7:ecfb1e60 r6:85a94700 r5:85878000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfbdfb0 to 0xecfbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d640 INFO: task kworker/1:409:6808 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:6811 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:6811 tgid:6811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ecfc1d84 r8:00000002 r7:60000013 r6:ecfc1d8c r5:85878c00 r4:85878c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8da40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f649000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aea78c r4:85aea400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85aea78c r4:85a94780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85878c00 r8:85a947ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94780 r8:8027f5e8 r7:ecfbde60 r6:85a94800 r5:85878c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfc1fb0 to 0xecfc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d780 INFO: task kworker/1:410:6811 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:00000000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85879800 r4:00000000 r9:83018205 r8:85879800 r7:00000000 r6:83018200 r5:00001000 r4:7f64f000 r5:85aeb38c r4:85aeb000 r10:61c88647 r9:85879800 r8:85a948ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:411:6812 is blocked on a mutex likely owned by task kworker/0:191:3684. dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r4:84b6b700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed045e08 r5:00001000 r4:ecc25000 r5:85aeab8c r4:85aea800 r4:85a94980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:6816 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:6816 tgid:6816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8587b000 [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecc53000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eccd9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8587bc00 r8:85a94bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:6820 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:6820 tgid:6820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed055d84 r8:00000002 r7:60000013 r6:ed055d8c r5:8587c800 r4:8587c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed055e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecca1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85aeb78c r4:85a94c80 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:6823 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed059d84 r8:00000002 r7:60000113 r6:ed059d8c r5:8587d400 r4:8587d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed059e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587d400 r7:00000000 r6:83018200 r5:00001000 r4:7f655000 r5:00001000 r4:ecd7f000 r5:85aebf8c r4:85aebc00 r10:61c88647 r9:8587d400 r8:85a94dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecd9d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:e055ddc0 r5:84b16b8c r4:84b16800 r4:84b6b700 Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:6826 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:6826 tgid:6826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed061d84 r8:00000002 r7:60000113 r6:ed061d8c r5:8587ec00 r4:8587ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f65b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8b8c r4:85af8800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8b8c r4:85a94f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587ec00 r8:85a94fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a94f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a94f80 r8:8027f5e8 r7:ed05de60 r6:85a5f000 r5:8587ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed061fb0 to 0xed061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a613c0 INFO: task kworker/1:418:6826 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b66900 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85b20000 r5:85b20000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b20000 r7:00000000 r6:83018200 r5:00001000 r4:7f659000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af878c r4:85af8400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af878c r4:85a5f080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b20000 r8:85a5f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f080 r8:8027f5e8 r7:ed061e60 r6:85a5f100 r5:85b20000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a614c0 INFO: task kworker/1:419:6828 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:6831 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:6831 tgid:6831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed169d84 r8:00000002 r7:60000113 r6:ed169d8c r5:85b20c00 r4:85b20c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b20c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85b20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f65d000 r5:00001000 r4:ece05000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af8f8c r4:85af8c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af8f8c r4:85a5f180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b20c00 r8:85a5f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f180 r8:8027f5e8 r7:ed061e60 r6:85a5f200 r5:85b20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed169fb0 to 0xed169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a61640 INFO: task kworker/1:420:6831 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:6832 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:6832 tgid:6832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed175d84 r8:00000002 r7:60000013 r6:ed175d8c r5:85b21800 r4:85b21800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b21800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed175e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61c40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b21800 r7:00000000 r6:83018200 r5:00001000 r4:7f661000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece53000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85af978c r4:85af9400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:6835 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:6835 tgid:6835 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61b00 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 r5:00001000 r4:e03a5000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r5:00001000 r4:ecea7000 r10:00000000 r9:85a5f480 r8:8027f5e8 r7:ed175e60 r6:85a5f500 r5:85b23000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:6839 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1bdd84 r8:00000002 r7:60000113 r6:ed1bdd8c r5:85b23c00 r4:85b23c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b23c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f67d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfef000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afab8c r4:85afa800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afab8c r4:85a5f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b23c00 r8:85a5f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f580 r8:8027f5e8 r7:ed18de60 r6:85a5f600 r5:85b23c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1bdfb0 to 0xed1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8d280 INFO: task kworker/1:424:6839 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 r4:e055ddc0 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:425 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1100 r5:00001000 r4:dfd67000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed2d5fb0 to 0xed2d5ff8) r4:859a1300 [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:e055ddc0 r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:6853 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:6853 tgid:6853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed2f1d84 r8:00000002 r7:60000013 r6:ed2f1d8c r5:85b25400 r4:85b25400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b25400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859a1a00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b25400 r7:00000000 r6:83018200 r5:00001000 r4:7f675000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf7d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afa78c r4:85afa400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afa78c r4:85a5f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b25400 r8:85a5f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f780 r8:8027f5e8 r7:ed1bde60 r6:85a5f800 r5:85b25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f1fb0 to 0xed2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a1740 INFO: task kworker/1:426:6853 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:6873 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:6873 tgid:6873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed331d84 r8:00000002 r7:60000113 r6:ed331d8c r5:85b24800 r4:85b24800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b24800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed331e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8280 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b24800 r7:00000000 r6:83018200 r5:00001000 r4:7f683000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed019000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afaf8c r4:85afac00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afaf8c r4:85a5f880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b24800 r8:85a5f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5f880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5f880 r8:8027f5e8 r7:ed1bde60 r6:85a5f900 r5:85b24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed331fb0 to 0xed331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859a1480 INFO: task kworker/1:427:6873 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd60: 80230ad4 80239bb0 800f0113 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6879 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6879 tgid:6879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed325d84 r8:00000002 r7:60000113 r6:ed325d8c r5:85b26000 r4:85b26000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b26000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8500 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b26000 r7:00000000 r6:83018200 r5:00001000 r4:7f5c7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec885000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85afb78c r4:85a5f980 r4:85a5f980 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:6884 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:6884 tgid:6884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed1b1d84 r8:00000002 r7:60000013 r6:ed1b1d8c r5:85b30000 r4:85b30000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b30000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b30000 r7:00000000 r6:83018200 r5:00001000 r4:7f5cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487078c r4:84870400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8487078c r4:85a5fa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b30000 r8:85a5faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fa80 r8:8027f5e8 r7:ed325e60 r6:85a5fb00 r5:85b30000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b1fb0 to 0xed1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8300 INFO: task kworker/1:429:6884 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:6885 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:6885 tgid:6885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed32dd84 r8:00000002 r7:60000013 r6:ed32dd8c r5:85b30c00 r4:85b30c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b30c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed32de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8640 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5c9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbb8c r4:85afb800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbb8c r4:85a5fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b30c00 r8:85a5fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fb80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fc00 r5:85b30c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed32dfb0 to 0xed32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8300 INFO: task kworker/1:430:6885 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:6888 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:6888 tgid:6888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:85b31800 r4:85b31800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b31800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa84c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b31800 r7:00000000 r6:83018200 r5:00001000 r4:7f5cb000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85afbf8c r4:85afbc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85afbf8c r4:85a5fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b31800 r8:85a5fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fc80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fd00 r5:85b31800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa86c0 INFO: task kworker/1:431:6888 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:6890 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:6890 tgid:6890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:eccadd84 r8:00000002 r7:60000113 r6:eccadd8c r5:85b33000 r4:85b33000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b33000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8ec0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b33000 r7:00000000 r6:83018200 r5:00001000 r4:7f5df000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0438c r4:85b04000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0438c r4:85a5fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b33000 r8:85a5fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fd80 r8:8027f5e8 r7:ed1b1e60 r6:85a5fe00 r5:85b33000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8840 INFO: task kworker/1:432:6890 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6892 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6892 tgid:6892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed33dd84 r8:00000002 r7:60000013 r6:ed33dd8c r5:85b34800 r4:85b34800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b34800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed33de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8f80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b34800 r7:00000000 r6:83018200 r5:00001000 r4:7f5e1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9fd000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0478c r4:85b04400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0478c r4:85a5fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b34800 r8:85a5feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5fe80 r8:8027f5e8 r7:eccade60 r6:85a5ff00 r5:85b34800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed33dfb0 to 0xed33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8a80 INFO: task kworker/1:433:6892 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:6897 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:6897 tgid:6897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed345d84 r8:00000002 r7:60000013 r6:ed345d8c r5:85b32400 r4:85b32400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b32400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed345e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84132b00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b32400 r7:00000000 r6:83018200 r5:00001000 r4:7f5e5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b04f8c r4:85b04c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b04f8c r4:85a5ff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b32400 r8:85a5ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ff80 r8:8027f5e8 r7:ed33de60 r6:85a92000 r5:85b32400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed345fb0 to 0xed345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85aa8e00 INFO: task kworker/1:434:6897 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:6899 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:6899 tgid:6899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed339d84 r8:00000002 r7:60000013 r6:ed339d8c r5:85b33c00 r4:85b33c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b33c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed339e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa8880 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b33c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5e3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca27000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b04b8c r4:85b04800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b04b8c r4:85a92080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b33c00 r8:85a920ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92080 r8:8027f5e8 r7:ed345e60 r6:85a92100 r5:85b33c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed339fb0 to 0xed339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84132b00 INFO: task kworker/1:435:6899 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:6901 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:6901 tgid:6901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed349d84 r8:00000002 r7:60000013 r6:ed349d8c r5:85b36000 r4:85b36000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b36000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed349e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c100 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b36000 r7:00000000 r6:83018200 r5:00001000 r4:7f5e7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0538c r4:85b05000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0538c r4:85a92180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b36000 r8:85a921ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92180 r8:8027f5e8 r7:ed345e60 r6:85a92200 r5:85b36000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed349fb0 to 0xed349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a78fc0 INFO: task kworker/1:436:6901 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:6904 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:6904 tgid:6904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85b36c00 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed34de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c280 r5:00001000 r4:ecac5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b0578c r4:85a92280 r4:85a92280 Exception stack(0xed34dfb0 to 0xed34dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:6905 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:6905 tgid:6905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed335d84 r8:00000002 r7:60000113 r6:ed335d8c r5:85b35400 r4:85b35400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b35400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed335e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c3c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f633000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b05b8c r4:85b05800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b05b8c r4:85a92380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b35400 r8:85a923ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92380 r8:8027f5e8 r7:ed34de60 r6:85a92400 r5:85b35400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed335fb0 to 0xed335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c080 INFO: task kworker/1:438:6905 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6906 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed359d84 r8:00000002 r7:60000013 r6:ed359d8c r5:8570a400 r4:8570a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed359e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f63b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc3b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0678c r4:85b06400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0678c r4:85a92480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:85a924ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92480 r8:8027f5e8 r7:ed335e60 r6:85689d80 r5:8570a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed359fb0 to 0xed359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c080 INFO: task kworker/1:439:6906 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:6909 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:6909 tgid:6909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed361d84 r8:00000002 r7:60000013 r6:ed361d8c r5:8570e000 r4:8570e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed361e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570e000 r7:00000000 r6:83018200 r5:00001000 r4:7f635000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b05f8c r4:85b05c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b05f8c r4:85a92500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570e000 r8:85a9252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92500 r8:8027f5e8 r7:ed359e60 r6:85689e00 r5:8570e000 r4:00000001 Exception stack(0xed361fb0 to 0xed361ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6910 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6910 tgid:6910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed365d84 r8:00000002 r7:60000013 r6:ed365d8c r5:8570c800 r4:8570c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed365e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8c840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f639000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0638c r4:85b06000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0638c r4:85a92580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570c800 r8:85a925ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92580 r8:8027f5e8 r7:ed359e60 r6:85689e80 r5:8570c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed365fb0 to 0xed365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c480 INFO: task kworker/1:441:6910 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 81112000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:6915 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:6915 tgid:6915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed36dd84 r8:00000002 r7:60000013 r6:ed36dd8c r5:85778000 r4:85778000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85778000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ca00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85778000 r7:00000000 r6:83018200 r5:00001000 r4:7f63d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc65000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b06b8c r4:85b06800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b06b8c r4:85a92600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85a92600 r8:8027f5e8 r7:ed359e60 r6:85689f00 r5:85778000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:84b16b8c r4:84b16800 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:6916 tgid:6916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed35dd84 r8:00000002 r7:60000013 r6:ed35dd8c r5:85b38c00 r4:85b38c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b38c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed35de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cb40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f641000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b06f8c r4:85b06c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b06f8c r4:85a92680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b38c00 r8:85a926ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92680 r8:8027f5e8 r7:ed36de60 r6:85a92700 r5:85b38c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed35dfb0 to 0xed35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c800 INFO: task kworker/1:443:6916 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe055dfb0 to 0xe055dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6918 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6918 tgid:6918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed369d84 r8:00000002 r7:60000013 r6:ed369d8c r5:85b39800 r4:85b39800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b39800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed369e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cd40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b39800 r7:00000000 r6:83018200 r5:00001000 r4:7f643000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0738c r4:85b07000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0738c r4:85a92780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b39800 r8:85a927ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92780 r8:8027f5e8 r7:ed35de60 r6:85a92800 r5:85b39800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed369fb0 to 0xed369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8c9c0 INFO: task kworker/1:444:6918 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r5:00001000 r4:e03a5000 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe055dfb0 to 0xe055dff8) r4:84b66900 task:kworker/1:445 state:D stack:0 pid:6920 tgid:6920 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ece0b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b07f8c r4:85b07c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b07f8c r4:85a92880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3a400 r8:85a928ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92880 r8:8027f5e8 r7:ed369e60 r6:85a92900 r5:85b3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed371fb0 to 0xed371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8ccc0 INFO: task kworker/1:445:6920 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85b3bc00 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ce00 r5:00001000 r4:ecd97000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0778c r4:85b07400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b0778c r4:85a92980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3bc00 r8:85a929ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92980 r8:8027f5e8 r7:ed371e60 r6:85a92a00 r5:85b3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed375fb0 to 0xed375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8cbc0 INFO: task kworker/1:446:6922 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:85b3c800 r4:8291892c r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8cfc0 r5:00001000 r4:ecdb1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b07b8c r4:85b07800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b07b8c r4:85a92a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3c800 r8:85a92aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92a80 r8:8027f5e8 r7:ed371e60 r6:85a92b00 r5:85b3c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed355fb0 to 0xed355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a8ce40 INFO: task kworker/1:447:6923 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6927 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3d000 r5:85b1038c r4:85b10000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1038c r4:85a92b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3e000 r8:85a92bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92b80 r8:8027f5e8 r7:ed371e60 r6:85a92c00 r5:85b3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed381fb0 to 0xed381ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69040 INFO: task kworker/1:448:6927 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:6931 tgid:6931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed385d84 r8:00000002 r7:60000113 r6:ed385d8c r5:85b3b000 r4:85b3b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b3b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed385e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f653000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece95000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b10b8c r4:85b10800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b10b8c r4:85a92c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3b000 r8:85a92cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a92c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a92c80 r8:8027f5e8 r7:ed381e60 r6:85a92d00 r5:85b3b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed385fb0 to 0xed385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69380 INFO: task kworker/1:449:6931 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:6932 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:6932 tgid:6932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed37dd84 r8:00000002 r7:60000013 r6:ed37dd8c r5:85b3ec00 r4:85b3ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b3ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed37de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f651000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1078c r4:85b10400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1078c r4:85a92d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b3ec00 r8:85a92dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xed37dfb0 to 0xed37dff8) Workqueue: events bpf_prog_free_deferred dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:451 state:D stack:0 pid:6935 tgid:6935 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eceaf000 [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a92e80 r8:8027f5e8 r7:ed385e60 r6:85a92f00 r5:85b3d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed389fb0 to 0xed389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69580 INFO: task kworker/1:451:6935 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69a80 r5:00001000 r4:ed049000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b1138c r4:85a92f80 r10:00000000 r9:85a92f80 r8:8027f5e8 r7:ed389e60 r6:85a6c000 r5:85b40000 r4:85a69700 Workqueue: events bpf_prog_free_deferred Exception stack(0xe055dd28 to 0xe055dd70) dd60: 80230ad4 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:6938 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:6938 tgid:6938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed391d84 r8:00000002 r7:60000113 r6:ed391d8c r5:85b40c00 r4:85b40c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b40c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed391e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f65d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cf000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b11f8c r4:85b11c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b11f8c r4:85a6c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b40c00 r8:85a6c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c080 r8:8027f5e8 r7:ed379e60 r6:85a6c100 r5:85b40c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed391fb0 to 0xed391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a69700 INFO: task kworker/1:453:6938 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:6939 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:6939 tgid:6939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed395d84 r8:00000002 r7:60000013 r6:ed395d8c r5:85b41800 r4:85b41800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69d40 r5:00001000 r4:ed09b000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a6c180 r8:8027f5e8 r7:ed391e60 r6:85a6c200 r5:85b41800 r4:85a69c80 r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r5:84b16b8c r4:84b16800 r4:84b6b700 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85b43c00 r4:8291892c [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed0b1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c280 r8:8027f5e8 r7:ed391e60 r6:85a6c300 r5:85b43c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed399fb0 to 0xed399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a699c0 INFO: task kworker/1:455:6942 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:6944 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:6944 tgid:6944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed39dd84 r8:00000002 r7:60000113 r6:ed39dd8c r5:85b43000 r4:85b43000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b43000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed39de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65400 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b43000 r7:00000000 r6:83018200 r5:00001000 r4:7f65f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed11d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1238c r4:85b12000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1238c r4:85a6c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b43000 r8:85a6c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c380 r8:8027f5e8 r7:ed391e60 r6:85a6c400 r5:85b43000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65100 INFO: task kworker/1:456:6944 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:6946 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:6946 tgid:6946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed38dd84 r8:00000002 r7:60000113 r6:ed38dd8c r5:85b44800 r4:85b44800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b44800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed38de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1278c r4:85b12400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1278c r4:85a6c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b44800 r8:85a6c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c480 r8:8027f5e8 r7:ed39de60 r6:85a6c500 r5:85b44800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed38dfb0 to 0xed38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65280 INFO: task kworker/1:457:6946 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:6949 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:6949 tgid:6949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a1d84 r8:00000002 r7:60000113 r6:ed3a1d8c r5:85b45400 r4:85b45400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b45400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b45400 r7:00000000 r6:83018200 r5:00001000 r4:7f661000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12b8c r4:85b12800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12b8c r4:85a6c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b45400 r8:85a6c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c580 r8:8027f5e8 r7:ed38de60 r6:85a6c600 r5:85b45400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a1fb0 to 0xed3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a653c0 INFO: task kworker/1:458:6949 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:6950 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:6950 tgid:6950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a5d84 r8:00000002 r7:60000013 r6:ed3a5d8c r5:85b46000 r4:85b46000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b46000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65840 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f667000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b12f8c r4:85b12c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b12f8c r4:85a6c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b46000 r8:85a6c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c680 r8:8027f5e8 r7:ed3a1e60 r6:85a6c700 r5:85b46000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a5fb0 to 0xed3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65500 INFO: task kworker/1:459:6950 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:6952 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:6952 tgid:6952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3a9d84 r8:00000002 r7:60000113 r6:ed3a9d8c r5:85b46c00 r4:85b46c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b46c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65b40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f67d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec729000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1378c r4:85b13400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1378c r4:85a6c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b46c00 r8:85a6c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c780 r8:8027f5e8 r7:ed3a5e60 r6:85a6c800 r5:85b46c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a9fb0 to 0xed3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a656c0 INFO: task kworker/1:460:6952 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:6954 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:6954 tgid:6954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3add84 r8:00000002 r7:60000113 r6:ed3add8c r5:85b42400 r4:85b42400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b42400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3ade08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65980 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b42400 r7:00000000 r6:83018200 r5:00001000 r4:7f675000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec705000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b1338c r4:85b13000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b1338c r4:85a6c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b42400 r8:85a6c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c880 r8:8027f5e8 r7:ed3a9e60 r6:85a6c900 r5:85b42400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3adfb0 to 0xed3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65800 INFO: task kworker/1:461:6954 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:6956 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:6956 tgid:6956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b1d84 r8:00000002 r7:60000013 r6:ed3b1d8c r5:85b38000 r4:85b38000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b38000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65cc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b38000 r7:00000000 r6:83018200 r5:00001000 r4:7f683000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec749000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13b8c r4:85b13800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13b8c r4:85a6c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b38000 r8:85a6c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6c980 r8:8027f5e8 r7:ed3a9e60 r6:85a6ca00 r5:85b38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b1fb0 to 0xed3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a659c0 INFO: task kworker/1:462:6956 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:6958 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:6958 tgid:6958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b5d84 r8:00000002 r7:60000113 r6:ed3b5d8c r5:85b48000 r4:85b48000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b48000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65fc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b48000 r7:00000000 r6:83018200 r5:00001000 r4:7f689000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5038c r4:85b50000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5038c r4:85a6ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b48000 r8:85a6caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ca80 r8:8027f5e8 r7:ed3b1e60 r6:85a6cb00 r5:85b48000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65ac0 INFO: task kworker/1:463:6958 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:6960 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:6960 tgid:6960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3b9d84 r8:00000002 r7:60000013 r6:ed3b9d8c r5:85b48c00 r4:85b48c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b48c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65e00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f687000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec769000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b13f8c r4:85b13c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b13f8c r4:85a6cb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b48c00 r8:85a6cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cb80 r8:8027f5e8 r7:ed3b5e60 r6:85a6cc00 r5:85b48c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b9fb0 to 0xed3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65c80 INFO: task kworker/1:464:6960 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:6962 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:6962 tgid:6962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3bdd84 r8:00000002 r7:60000113 r6:ed3bdd8c r5:85b49800 r4:85b49800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b49800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3bde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c480 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f68f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec819000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50f8c r4:85b50c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b50f8c r4:85a6cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b49800 r8:85a6ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cc80 r8:8027f5e8 r7:ed3b5e60 r6:85a6cd00 r5:85b49800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3bdfb0 to 0xed3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85a65e40 INFO: task kworker/1:465:6962 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:6963 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:6963 tgid:6963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c1d84 r8:00000002 r7:60000113 r6:ed3c1d8c r5:85b4a400 r4:85b4a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c040 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f68b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5078c r4:85b50400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5078c r4:85a6cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4a400 r8:85a6cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cd80 r8:8027f5e8 r7:ed3bde60 r6:85a6ce00 r5:85b4a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c1fb0 to 0xed3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c080 INFO: task kworker/1:466:6963 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:6965 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:6965 tgid:6965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c5d84 r8:00000002 r7:60000113 r6:ed3c5d8c r5:85b4b000 r4:85b4b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f68d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fb000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b50b8c r4:85b50800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b50b8c r4:85a6ce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4b000 r8:85a6ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6ce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6ce80 r8:8027f5e8 r7:ed3bde60 r6:85a6cf00 r5:85b4b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c5fb0 to 0xed3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c240 INFO: task kworker/1:467:6965 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:6968 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:6968 tgid:6968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3c9d84 r8:00000002 r7:60000113 r6:ed3c9d8c r5:85b4bc00 r4:85b4bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c600 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f691000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb15000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5138c r4:85b51000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5138c r4:85a6cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4bc00 r8:85a6cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6cf80 r8:8027f5e8 r7:ed3bde60 r6:8598d000 r5:85b4bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c9fb0 to 0xed3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c280 INFO: task kworker/1:468:6968 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:6970 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:6970 tgid:6970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3cdd84 r8:00000002 r7:60000113 r6:ed3cdd8c r5:85b4c800 r4:85b4c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3cde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f693000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb49000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5178c r4:85b51400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5178c r4:8598d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4c800 r8:8598d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d080 r8:8027f5e8 r7:ed3c9e60 r6:8598d100 r5:85b4c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3cdfb0 to 0xed3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c400 INFO: task kworker/1:469:6970 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:6972 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:6972 tgid:6972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d1d84 r8:00000002 r7:60000113 r6:ed3d1d8c r5:85b4d400 r4:85b4d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599c900 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f695000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb93000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b51b8c r4:85b51800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b51b8c r4:8598d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4d400 r8:8598d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d180 r8:8027f5e8 r7:ed3cde60 r6:8598d200 r5:85b4d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d1fb0 to 0xed3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c580 INFO: task kworker/1:470:6972 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:6974 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:6974 tgid:6974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d5d84 r8:00000002 r7:60000113 r6:ed3d5d8c r5:85b4e000 r4:85b4e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599ca40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4e000 r7:00000000 r6:83018200 r5:00001000 r4:7f697000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b51f8c r4:85b51c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b51f8c r4:8598d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4e000 r8:8598d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d280 r8:8027f5e8 r7:ed3d1e60 r6:8598d300 r5:85b4e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d5fb0 to 0xed3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c700 INFO: task kworker/1:471:6974 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:6976 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:6976 tgid:6976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3d9d84 r8:00000002 r7:60000113 r6:ed3d9d8c r5:85b4ec00 r4:85b4ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b4ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3d9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cc00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f699000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd77000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5238c r4:85b52000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5238c r4:8598d380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b4ec00 r8:8598d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d380 r8:8027f5e8 r7:ed3d5e60 r6:8598d400 r5:85b4ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3d9fb0 to 0xed3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599c8c0 INFO: task kworker/1:472:6976 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:6978 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:6978 tgid:6978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3ddd84 r8:00000002 r7:60000013 r6:ed3ddd8c r5:85b88000 r4:85b88000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b88000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3dde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cdc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f69b000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5278c r4:85b52400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5278c r4:8598d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b88000 r8:8598d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d480 r8:8027f5e8 r7:ed3d9e60 r6:8598d500 r5:85b88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3ddfb0 to 0xed3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599ca80 INFO: task kworker/1:473:6978 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:6980 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:6980 tgid:6980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e9d84 r8:00000002 r7:60000013 r6:ed3e9d8c r5:8577bc00 r4:8577bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f140 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6a3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf73000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5378c r4:85b53400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5378c r4:8598d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577bc00 r8:8598d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d580 r8:8027f5e8 r7:ed3dde60 r6:85689f80 r5:8577bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e9fb0 to 0xed3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cc40 INFO: task kworker/1:474:6980 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) r4:82ac11e4 r4:00000000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:6983 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:6983 tgid:6983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f5d84 r8:00000002 r7:60000113 r6:ed3f5d8c r5:85779800 r4:85779800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85779800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cf00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85779800 r7:00000000 r6:83018200 r5:00001000 r4:7f69d000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf07000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b52b8c r4:85b52800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b52b8c r4:8598d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85779800 r8:8598d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d600 r8:8027f5e8 r7:ed3e9e60 r6:8597c000 r5:85779800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f5fb0 to 0xed3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cd80 INFO: task kworker/1:475:6983 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:6984 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:6984 tgid:6984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3f9d84 r8:00000002 r7:60000013 r6:ed3f9d8c r5:85778c00 r4:85778c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85778c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f9e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8599cfc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f69f000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf21000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b52f8c r4:85b52c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b52f8c r4:8598d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85778c00 r8:8598d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d680 r8:8027f5e8 r7:ed3e9e60 r6:8597c080 r5:85778c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f9fb0 to 0xed3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8599cd80 INFO: task kworker/1:476:6984 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:6985 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:6985 tgid:6985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3fdd84 r8:00000002 r7:60000113 r6:ed3fdd8c r5:8577d400 r4:8577d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3fde08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a65f40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6a1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5338c r4:85b53000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5338c r4:8598d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577d400 r8:8598d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d700 r8:8027f5e8 r7:ed3e9e60 r6:8597c100 r5:8577d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3fdfb0 to 0xed3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8511bf80 INFO: task kworker/1:477:6985 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:6988 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:6988 tgid:6988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed401d84 r8:00000002 r7:60000013 r6:ed401d8c r5:8577e000 r4:8577e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed401e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f300 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577e000 r7:00000000 r6:83018200 r5:00001000 r4:7f6a5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa1000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b53b8c r4:85b53800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b53b8c r4:8598d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577e000 r8:8598d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d780 r8:8027f5e8 r7:ed3e9e60 r6:8597c180 r5:8577e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed401fb0 to 0xed401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f200 INFO: task kworker/1:478:6988 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:6990 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:6990 tgid:6990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e1d84 r8:00000002 r7:60000113 r6:ed3e1d8c r5:8577ec00 r4:8577ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e1e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85991e80 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6a9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5738c r4:85a57000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5738c r4:8598d800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577ec00 r8:8598d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d800 r8:8027f5e8 r7:ed401e60 r6:8597c200 r5:8577ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e1fb0 to 0xed3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:479:6990 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:6993 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:6993 tgid:6993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed409d84 r8:00000002 r7:60000013 r6:ed409d8c r5:8577b000 r4:8577b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8577b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed409e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8577b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6ab000 r5:00001000 r4:ecff9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b53f8c r4:85b53c00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b53f8c r4:8598d880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577b000 r8:8598d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d880 r8:8027f5e8 r7:ed3e1e60 r6:8597c280 r5:8577b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed409fb0 to 0xed409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:480:6993 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:481 state:D stack:0 pid:6995 tgid:6995 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8577c800 r4:8291892c r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed411e08 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed00f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b5c38c r4:8598d900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:6997 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:6997 tgid:6997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed419d84 r8:00000002 r7:60000113 r6:ed419d8c r5:8570d400 r4:8570d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8570d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed419e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5cb8c r4:85b5c800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5cb8c r4:8598d980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570d400 r8:8598d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d980 r8:8027f5e8 r7:ed411e60 r6:8597c380 r5:8570d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed419fb0 to 0xed419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:482:6997 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:6998 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:6998 tgid:6998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed3e5d84 r8:00000002 r7:60000113 r6:ed3e5d8c r5:85b88c00 r4:85b88c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b88c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e5e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597f780 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6af000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed021000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5c78c r4:85b5c400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5c78c r4:8598da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b88c00 r8:8598da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598da00 r8:8027f5e8 r7:ed419e60 r6:8598da80 r5:85b88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e5fb0 to 0xed3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f180 INFO: task kworker/1:483:6998 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:7000 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:7000 tgid:7000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed41dd84 r8:00000002 r7:60000013 r6:ed41dd8c r5:85b8a400 r4:85b8a400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8a400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed41de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed139000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5d38c r4:85b5d000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5d38c r4:8598db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8a400 r8:8598db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598db00 r8:8027f5e8 r7:ed419e60 r6:8598db80 r5:85b8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed41dfb0 to 0xed41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f600 INFO: task kworker/1:484:7000 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:7003 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:7003 tgid:7003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed421d84 r8:00000002 r7:60000013 r6:ed421d8c r5:85b8c800 r4:85b8c800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8c800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed421e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fb00 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f6b3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5cf8c r4:8598dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8c800 r8:8598dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598dc00 r8:8027f5e8 r7:ed41de60 r6:8598dc80 r5:85b8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed421fb0 to 0xed421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f980 INFO: task kworker/1:485:7003 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:7005 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed425d84 r8:00000002 r7:60000013 r6:ed425d8c r5:85b8d400 r4:85b8d400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8d400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed425e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f6b7000 r5:00001000 r4:ed145000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85b5d78c r4:8598dd00 r4:8598dd00 Exception stack(0xed425fb0 to 0xed425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe055dd28 to 0xe055dd70) [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:7007 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:7007 tgid:7007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed429d84 r8:00000002 r7:60000113 r6:ed429d8c r5:85b8b000 r4:85b8b000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8b000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed429e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975540 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f6bf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ad000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e38c r4:85b5e000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5e38c r4:8598de00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8b000 r8:8598de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598de00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598de00 r8:8027f5e8 r7:ed425e60 r6:8598de80 r5:85b8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed429fb0 to 0xed429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597fa40 INFO: task kworker/1:487:7007 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:7009 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:7009 tgid:7009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed42dd84 r8:00000002 r7:60000013 r6:ed42dd8c r5:85b8ec00 r4:85b8ec00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8ec00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a699c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f6b9000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed14f000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5db8c r4:85b5d800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5db8c r4:8598df00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8ec00 r8:8598df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598df00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598df00 r8:8027f5e8 r7:ed429e60 r6:8598df80 r5:85b8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:488:7009 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 817a4000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:7011 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:7011 tgid:7011 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed435d84 r8:00000002 r7:60000013 r6:ed435d8c r5:85b8e000 r4:85b8e000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8e000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed435e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f6bd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17d000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5df8c r4:85b5dc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5df8c r4:85973000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8e000 r8:8597302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973000 r8:8027f5e8 r7:ed429e60 r6:85973080 r5:85b8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975140 INFO: task kworker/1:489:7011 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83ae3000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:7014 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:7014 tgid:7014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed431d84 r8:00000002 r7:60000113 r6:ed431d8c r5:85b8bc00 r4:85b8bc00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b8bc00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed431e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975680 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f6c1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e9000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5e78c r4:85b5e400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5e78c r4:85973100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b8bc00 r8:8597312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973100 r8:8027f5e8 r7:ed429e60 r6:85973180 r5:85b8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed431fb0 to 0xed431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975340 INFO: task kworker/1:490:7014 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83bd2000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:7016 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:7016 tgid:7016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed439d84 r8:00000002 r7:60000013 r6:ed439d8c r5:85b89800 r4:85b89800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b89800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed439e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975800 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1f7000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5eb8c r4:85b5e800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5eb8c r4:85973200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b89800 r8:8597322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973200 r8:8027f5e8 r7:ed431e60 r6:85973280 r5:85b89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975500 INFO: task kworker/1:491:7016 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 83e54000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:7018 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:7018 tgid:7018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed43dd84 r8:00000002 r7:60000013 r6:ed43dd8c r5:85b90000 r4:85b90000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b90000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed43de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859704c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f6cd000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed249000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc038c r4:85bc0000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc038c r4:85973300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b90000 r8:8597332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973300 r8:8027f5e8 r7:ed439e60 r6:85973380 r5:85b90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed43dfb0 to 0xed43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975600 INFO: task kworker/1:492:7018 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84185000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:7020 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:7020 tgid:7020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed405d84 r8:00000002 r7:60000013 r6:ed405d8c r5:85b91800 r4:85b91800 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b91800 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85975940 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f6c5000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ef8c r4:85b5ec00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5ef8c r4:85973400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b91800 r8:8597342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973400 r8:8027f5e8 r7:ed43de60 r6:85973480 r5:85b91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:859757c0 INFO: task kworker/1:493:7020 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84419000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:7025 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:7025 tgid:7025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed44dd84 r8:00000002 r7:60000013 r6:ed44dd8c r5:85b92400 r4:85b92400 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b92400 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed44de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859705c0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f6cf000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed257000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc078c r4:85bc0400 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc078c r4:85973500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b92400 r8:8597352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973500 r8:8027f5e8 r7:ed43de60 r6:85973580 r5:85b92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed44dfb0 to 0xed44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975b80 INFO: task kworker/1:494:7025 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 847d2000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:7027 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:7027 tgid:7027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed455d84 r8:00000002 r7:60000013 r6:ed455d8c r5:85b93c00 r4:85b93c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b93c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed455e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8597fc40 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d3000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed279000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5f38c r4:85b5f000 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5f38c r4:85973600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b93c00 r8:8597362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973600 r8:8027f5e8 r7:ed44de60 r6:85973680 r5:85b93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed455fb0 to 0xed455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975d80 INFO: task kworker/1:495:7027 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84bff000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:7029 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed459d84 r8:00000002 r7:60000013 r6:ed459d8c r5:85b93000 r4:85b93000 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b93000 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed459e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85970700 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b93000 r7:00000000 r6:83018200 r5:00001000 r4:7f6d1000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed26b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bc0b8c r4:85bc0800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bc0b8c r4:85973700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b93000 r8:8597372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973700 r8:8027f5e8 r7:ed455e60 r6:85973780 r5:85b93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed459fb0 to 0xed459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85975f00 INFO: task kworker/1:496:7029 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84edd000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:7031 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:7031 tgid:7031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed45dd84 r8:00000002 r7:60000113 r6:ed45dd8c r5:85b90c00 r4:85b90c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85b90c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987440 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6db000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2b3000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ff8c r4:85b5fc00 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5ff8c r4:85973800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85b90c00 r8:8597382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85973800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85973800 r8:8027f5e8 r7:ed455e60 r6:8597c400 r5:85b90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed45dfb0 to 0xed45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8597f240 INFO: task kworker/1:497:7031 is blocked on a mutex likely owned by task kworker/0:191:3684. task:kworker/0:191 state:R running task stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a642f0>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84be9800 r8:80200be4 r7:e055dd5c r6:ffffffff r5:84be9800 r4:00000000 [<81a642b0>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe055dd28 to 0xe055dd70) dd20: 84edd000 e038f000 00000001 80239b98 7f837000 00000001 dd40: 82ac05a0 7f837000 e038f000 8280c930 82ac11c4 e055dda4 e055dda8 e055dd78 dd60: 80230ad4 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e3e9c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e3c8c>] (__purge_vmap_area_lazy) from [<804e4244>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e055ddc0 r5:e055de08 r4:e055ddc0 [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b66dc0 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03a5000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c8540>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b16b8c r4:84b6b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be9800 r8:84b6b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b6b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6b700 r8:8027f5e8 r7:e0551e60 r6:84b6e880 r5:84be9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b66900 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:7033 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:7033 tgid:7033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62f34>] (__schedule) from [<81a63ebc>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a62f34>] (__schedule) from [<81a63ebc>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:82918930 r9:ed441d84 r8:00000002 r7:60000113 r6:ed441d8c r5:84848c00 r4:84848c00 [<81a63e90>] (schedule) from [<81a642a4>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84848c00 r4:8291892c [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6428c>] (schedule_preempt_disabled) from [<81a66988>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a66688>] (__mutex_lock.constprop.0) from [<81a66e54>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed441e08 r4:00000000 [<81a66e40>] (__mutex_lock_slowpath) from [<81a66e94>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a66e58>] (mutex_lock) from [<804e40c8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e4060>] (_vm_unmap_aliases) from [<804e7fa8>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85987180 r4:00000000 [<804e7e40>] (vfree) from [<80547c48>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6d7000 [<80547c18>] (execmem_free) from [<803c721c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29b000 [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c720c>] (bpf_jit_free_exec) from [<803c75fc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7594>] (bpf_jit_free) from [<803c868c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5f78c r4:85b5f400